Algorithms and Dynamical Models for Communities ...

14 downloads 9413 Views 8MB Size Report
SOCIAL networks have become increasingly more prominent the last decade. ... One of the most popular method for doing community detection is that.
Algorithms and Dynamical Models for Communities and Reputation in Social Networks V.A. Traag

Thèse présentée en séance publique le 2 septembre en vue de l’obtention du grade de Docteur en Sciences appliquées.

Contents

Acknowledgements 1

Introduction 1.1 My contributions

I

Communities in networks

2

Community detection 2.1 Modularity 2.2 Canonical community detection 2.2.1

Reichardt and Bornholdt

2.2.2

Arenas, Fernández and Gómez

2.2.3

Ronhovde and Nussinov

2.2.4

Constant Potts model

2.2.5

Label propagation

2.2.6

Random walker

2.2.7

Infomap

2.2.8

Alternative clustering methods

2.3 Algorithms 2.3.1

Simulated annealing

2.3.2

Greedy improvement

2.3.3

Louvain method

2.3.4

Eigenvector

2.4 Benchmarks 2.4.1

Test networks

2.4.2

Comparing partitions

2.4.3

Results

9 11 13

19 20 22 25 28 29 30 30 32 34 39 40 41 43 45 47 50 50 53 56

Contents

3

Scale invariant community detection 3.1 Issues with modularity 3.1.1 3.1.2 3.1.3

Resolution limit Non-locality Spuriously high modularity

3.2 Resolution limit in other models 3.2.1 3.2.2 3.2.3

RB model AFG model CPM and RN

3.3 Scale invariance 3.3.1 3.3.2

4

Relaxing the null models Defining scale invariance

Finding significant resolutions 4.1 Scanning resolution parameter 4.2 Significance of partition 4.2.1 4.2.2

5

Scanning for significance Optimizing significance

Modularity with negative links 5.1 Social balance 5.1.1

Frustration

5.2 Weighted models 5.3 Implementation & benchmark

6

Applications 6.1 Communities in international relations 6.1.1 6.1.2 6.1.3 6.1.4

Direct trade and conflict Trading communities and conflict The trade network Results

6.2 Scientific communities and negative links 6.2.1 6.2.2 6.2.3

II 7 4

Effect of negative links Dissensus or specialization? A public debate

61 61 61 66 68 70 70 75 77 80 80 83 93 93 98 109 111 115 115 116 118 121 125 125 128 130 133 135 140 143 145 146

Social Balance & Reputation Social balance

153

Contents

8

7.1 Balanced triads 7.2 Balanced cycles 7.3 Weak social balance

155 158 162

Models of social balance

167 167 168 171 173 185

8.1 Discrete models 8.1.1 8.1.2

Local triad dynamics Constrained triad dynamics

8.2 Continuous time squared model 8.3 Continuous time transpose model

9

Evolution of cooperation 9.1 Game theory 9.1.1 9.1.2 9.1.3 9.1.4

Finite population size Fixation probability for 2 × 2 games Infinite population size Prisoner’s dilemma

9.2 Towards cooperation 9.2.1 9.2.2

Direct reciprocity Indirect reciprocity

9.3 Private reputation

10 Ranking nodes using reputation 10.1 Ranking nodes 10.2 Including negative links 10.3 Convergence and uniqueness

11 Conclusion

201 201 205 207 214 219 222 222 226 237 245 245 248 254 259

Bibliography

261

Nomenclature

281

Index

283

5

List of Figures

1.1 Example of communities in networks

12

2.1 Benchmark results 2.2 Hierarchical benchmark results

58 59

3.1 3.2 3.3 3.4 3.5

Ring of cliques Ring of rings Locality effect Scale invariance illustration Scale invariance in ring of cliques

62 66 67 84 85

4.1 4.2 4.3 4.4 4.5

Scanning resolution parameter Resolution profile for ER graph Significance for benchmark graphs Hierarchical scanning results Benchmark results for significance

98 107 108 109 113

5.1 Problem of modularity with negative links 5.2 Multi-slice modularity to layers 5.3 Benchmark results with negative links

119 123 124

6.1 6.2 6.3 6.4 6.5 6.6 6.7

127 131 136 144 147 149 150

Communities in the conflict and alliance network Two trade networks of different densities Trading Communities in 2000 Difference in communities when making links negative Communities over time with most frequent terms Thematic communities assuming ties to be positive Positional communities assuming ties to be negative

7.1 Balanced triads in complete network

157

LIST OF FIGURES

7.2 Cycle with chord

160

8.1 Phase portrait of complex eigenvalue 8.2 Generic behaviour of X˙ = X 2 8.3 Generic behaviour of X˙ = XX>

177 183 195

9.1 9.2 9.3 9.4 9.5 9.6 9.7 9.8 9.9

205 222 227 231 235 240 241 242 243

Schematic of the evolutionary dynamics Prisoner’s dilemma First order indirect reciprocity Second order indirect reciprocity Third order indirect reciprocity Evolutionary performance of both models Performance for different number of agents Results including type A, B and defectors Results different intensities of selection

10.1 Co-authorship network of network scientists.

8

257

Acknowledgements

The first presentation ever of my research was on February 2009, Friday the 13th —how scary is that—and was in front of mathematicians in Louvainla-Neuve—how scary is that. Having only a Masters in sociology in my pocket I arrived there to apply for a position as a PhD candidate (although, if memory serves me well, that was not entirely clear for everyone). Of course, I was no complete stranger to mathematics, yet not having studied it and still wanting to pursue a PhD in that direction did not quite seem to add up. Fortunately, my advisors Paul Van Dooren and Yurii Nesterov were happy to take me on board. I am grateful to this date that they have done so. The leeway they allowed me to pursue my own interest is much appreciated. I have learned a lot from them, and both are impressively (if not intimidatingly) fast when doing mathematics. I was fortunate enough to be funded by the Actions de recherche concertées, Large Graphs and Networks of the Communauté Française de Belgique and the Belgian Network DYSCO (Dynamical Systems, Control, and Optimization), funded by the Interuniversity Attraction Poles Programme, initiated by the Belgian State, Science Policy Office. My fellow PhD students have also taught me a lot. Not having had the exact same training as most other PhD candidates, I could borrow their expertise in trying to understand something. For some courses I was the designated teaching assistant, without actually ever having taken the course myself, making it somewhat of a challenge. For example, I had to learn integer programming. Before being able to learn integer programming, I had to learn linear programming, which also involved doing the simplex algorithm. If I say I will never forget that, it is probably true, but I would like to never make another simplex tableau again. Around the time I started, there were a few other students coming in from the private sector: Pierre, François-Xavier and Arnaud, which reassured me that I was not the only one that had tried the private sector and returned to academia. Throughout the years, Arnaud and I collaborated

Acknowledgements

on various projects, I have enjoyed our cooperation very much. Similarly for Pierre Deville and Adeline Decuyper, it was a pleasure working with you, and good luck organising NetMob next time around, for which Vincent Blondel was kind enough to invite us last year. Finally, I would like to thank everybody else in the Euler building (too many people to list) for the great atmosphere during coffee breaks and lunch time. I have enjoyed the conversations in the cafeteria very much, although for the most part I have only listened instead of actually engaging in the discussions. I would like to thank the other members of the jury, François Glineur, Vincent Blondel, Marco Saerens and Patrick De Leenheer. Their comments and remarks have greatly improved this thesis. I have had the pleasure to collaborate with Patrick while he was Belgium in 2012. His help was quintessential to the progress on the social balance project, for which I am much obliged. Many friends and family have come to visit in Brussels, and it was always a pleasure having you. Bas, Hans-Hein and Mathijs, you have always had that fingerspitzengefühl for coming to Brussels. Merijn, despite your busy job, two kids, moving two times and an entire renovation, you still managed to come to Brussels: so good you could make it. Roel, our discussions on the balcony of the Rue Lebeau were marvellous—as always—I hope to continue many of them in Amsterdam. Many a Sunday morning was spent at the Vossenplein/Place du Jeu de Balle when my family inlaw came over. Fortunately, due to long breakfasts we never arrived that early, you’re always welcome for such long breakfasts. From Brussels, I have very much enjoyed climbing with you Tom, I hope to see you still after moving. Frank, our lunches were a pleasant distraction from the daily PhD grind. Many friends go unnamed, but not forgotten: I hope to see you all more often when I am back in Amsterdam. Likewise for my parents, my brother and sister, Ernst and Susan, I hope to see you more often, Marco, Carlijn and Niels included of course. I hold you all very dear. Mom and dad, you have always supported me—both before and during my PhD—I will always be grateful for your care and love. Finally, somebody that merits a paragraph in its own. The first two years of my PhD our time together largely loomed in the shadow of the loss of your mother. Although such a loss will always leave a void, together I believe we have overcome. After having been parted by over two hundred kilometres of rail for over three years, we finally spent the last year together in Brussels. It was a bliss to finally live together, and I hope to continue to enjoy your company for many years to come! Lio, you are my true love. 10

1 S

Introduction

OCIAL networks have become increasingly more prominent the last decade. The advent of online social networks have attracted the interest of millions of people. It allows friends to connect over the internet, and share whatever they want with each other. Facebook was only launched in 2004, and has started out with a few thousand people, but currently over 1 billion people use its services. Although the online social network of competitor Google was rolled out only in 2011, they apparently have succeeded in attracting over 500 million people. Other services such as LinkedIn use a more professional career orientation and have a smaller user base of only about 90 million users. Twitter, with its well known short messages, has grown to half a billion users in only 6 years time. They handle more than 300 million tweets per day, some 3500 messages per second. The structure of these networks are fascinating, and gives us a glimpse of how humans connect to each other. One prominent feature of many social networks is the clustering of people. Friends tend to have many friends in common, thereby creating social groups in which many people know each other. Knowing these social groups yields additional insight into the structure of these networks; it yields a “birds eye view” of these networks, a global picture of what it looks like, as illustrated in Fig. 1.1. To find these social groups, the idea is to look for densely connected subgraphs in the network, which are only loosely connected amongst each other. These dense subgraphs are commonly known as “communities” in the literature, and the field that deals with finding such communities as “community detection” (Fortunato, 2010; Porter, Onnela and Mucha, 2009). One of the most popular method for doing community detection is that of modularity (Newman and Girvan, 2004). It focus on groups of nodes that have a higher density then can be expected in a random graph. This method is actually a special case of a more general framework which we will introduce in chapter 2. Although modularity works reasonably well,

1

Introduction

Fig. 1.1

Example of communities in networks

the comparison to a random graph introduces non-trivial problems, and it forecloses the detection of relatively small communities in large networks, the so called resolution limit. We will analyse this problem in chapter 3 and suggest some methods for addressing these issues. Although the solution we propose doesn’t suffer from the resolution limit, there are still some questions related to scale. In particular, should the partition be rather coarse of rather fine? This leads to the concept of finding some “significant” scale which we will address in chapter 4. Although most methods for community detection focus on networks that have positive links, negative links also appear naturally in numerous fields. Such negative links represents animosity, such as hatred, war or conflict. Incorporating these negative links can be done in a relatively natural manner. Whereas for negative links we would like to have relatively many positive links within a community, for negative links this intuition is the inverse, and we would like to have relatively little negative links within a community. We address this issue in chapter 5. We will review some applications of community detection in chapter 6 in a network of international relations and a citation network. The structure of negative links has been studied by the social sciences before in the context of “social balance” (Cartwright and Harary, 1968; Harary, 1953; Cartwright and Harary, 1979). This theory is based on the adage that “the enemy of an enemy is a friend”, and we will review it in chapter 7. The main observation is that socially balanced networks can be 12

My contributions

split in (at most) two factions where each faction has only positive links within and negative links between the factions (Harary, 1953). Besides the important question of detecting such factions in networks, which is already reviewed in chapter 5, one of the main questions is how social balance may emerge and why we observe it so often. We will review some dynamical models that can potentially explain the emergence of social balance in chapter 8. In addition there is a natural connection between negative links and the problem of the evolution of cooperation (Nowak, 2006b). We consider a positive link to indicate cooperation and a negative link to indicate defection (i.e. not cooperating). The evolution of cooperation is problematic since defection is usually the only sensible option. But if one could gain by defecting, then why is cooperation so common? One possible mechanism is through reputation, also known as “indirect reciprocity” (Nowak and Sigmund, 2005). We will briefly review the evolution of cooperation, and show in chapter 9 that some model that explains social balance can lead to cooperation. Finally, if we are given some network that has positive and negative links, we might also wonder how to determine with whom to cooperate. This is especially pertinent in online markets such as eBay or Amazon. In such settings we would like to make sure that we can trust with whomever we deal with. We assume that positive links indicate some trust and negative links some distrust. Based on these local trust values we calculate a global trust value—a reputation. This reputation can then be used to take further action, for example banning nodes with a negative reputation from the network. We will suggest such a method in chapter 10.

1.1

My contributions Of course, not all material covered in this thesis is mine, and my work builds on that of a long line of previous scholars. To make clear what my contributions are, I briefly describe them here, although they are of course also referred to at the appropriate places. In community detection, I believe I made two large contributions to the field. The first is the development of the notion of resolution-limit-free, or scale-invariance, as I’ve termed it in this thesis. This concept allows scholars to state more formally if a method does or does not suffer from a resolution-limit (see chapter 3 for details). Moreover, it appeared that only few methods were scale-invariant, of which CPM is one such method 13

1

Introduction

(see chapter 2 for the introduction of the method) This work forms the foundation for chapters 2 and 3 and has been published here: 1. Traag, VA, Van Dooren, P and Nesterov, Y (2011b). Narrow scope for resolution-limit-free community detection. Physical Review E, 84(1):016114. doi: 10.1103/PhysRevE.84.016114. arXiv:1104.3083 The second large contribution is more recent. It deals with the question how to choose an appropriate resolution parameter for the CPM method. More specifically, I try to do so by focusing on the significance of a partition (see chapter 4). I believe this will help future scholars in trying to determine how relevant their partition is. It has not yet been published, but it is available from the arXiv: 2. Traag, VA, Krings, G and Van Dooren, P (2013). Significant scales in community structure. submitted. arXiv:1306.3398 More minor theoretical work involved the incorporation of negative links in community detection. From a theoretical point of side, this contribution is relatively straightforward, although the applications are quite interesting. It forms the basis for chapter 5. This was published at the beginning of my PhD thesis: 3. Traag, VA and Bruggeman, J (2009). Community detection in networks with positive and negative links. Physical Review E, 80(3):036115. doi: 10.1103/PhysRevE.80.036115. arXiv:0811.2329 I have collaborated with others on two applications of community detection. The focus in both cases is on conflict or negative links, and less on the scale-invariant method (research using that method is ongoing). These collaborations have resulted in two publications in more domain specific journals: 4. Lupu, Y and Traag, VA (2012). Trading Communities, the Networked Structure of International Relations, and the Kantian Peace. Journal of Conflict Resolution. doi: 10.1177/0022002712453708 5. Bruggeman, J, Traag, VA and Uitermark, J (2012). Detecting Communities through Network Data. American Sociological Review, 77(6):1050– 1063. doi: 10.1177/0003122412463574 The incorporation of negative links have also led me in the direction of studying them outside the field of community detection. In particular, the 14

My contributions

theory of social balance is relevant there (see chapter 7). The most interesting question is: what dynamics would lead to social balance? We address this question in chapter 8 and is largely based on: 6. Traag, VA, Van Dooren, P and De Leenheer, P (2013). Dynamical models explaining social balance and evolution of cooperation. PLoS ONE, 8(4):e60063. doi: 10.1371/journal.pone.0060063. arXiv:1207.6588 The connection of social balance to the evolution of cooperation (see chapter 9) interested me already before, and I briefly addressed that in this conference paper: 7. Traag, VA, Van Dooren, P and Nesterov, Y (2011a). Indirect reciprocity through gossiping can lead to cooperative clusters. In IEEE Symposium on Artificial Life 2011, pages 154–161. IEEE. doi: 10.1109/ALIFE.2011.5954642

The issue of trying to rank nodes when negative links are present is also addressed in a conference paper: 8. Traag, VA, Nesterov, Y and Van Dooren, P (2010). Exponential Ranking: taking into account negative links. LNCS, 6430:192–202. doi: 10.1007/978-3-642-16567-2

Finally, I was involved in some publications that have not been included in this thesis. For the sake of completeness, I would simply like to list them here: 9. Traag, VA, Browet, A, Calabrese, F and Morlot, F (2011). Social Event Detection in Massive Mobile Phone Data Using Probabilistic Location Inference. In Proceedings IEEE SocialCom’2011, pages 625–628. IEEE. doi: 10.1109/PASSAT/SocialCom.2011.133 10. Csáji, B, Browet, A, Traag, VA, Delvenne, JC, Huens, E et al. (2012). Exploring mobility of mobile users. Physica A, 392(6):1459–1473. doi: 10.1016/j.physa.2012.11.040

15

PART I Communities in networks

2

Community detection

I

N many fields, the idea of having communities is quite natural. In social networks—the main focus of this thesis—communities correspond naturally to social groups. But other networks also frequently have such dense subgraphs. In networks of international trade, some countries trade much with each other, but not so much with others (Barigozzi, Fagiolo and Mangioni, 2011). For example, many Western countries trade more amongst each other than with others. But also technological networks such as the world wide web contain communities: websites of related content refer mostly to each other (Kleinberg and Lawrence, 2001). These communities then represent common topics, such as politics, football or auto mobiles. Biological networks, such as food webs—which species eats which species—have communities in the form of ecological subsystems, a phenomenon also known as compartmentalization (Stouffer and Bascompte, 2011). For example, in the ocean, many species live in the top of the ocean, hence feeding only on other species which live there, while completely different species exist at greater depths. We might also mention biochemical networks such as protein-protein interaction or metabolic networks, where communities seem to represent proteins or metabolites with similar functions (Guimerà and Nunes Amaral, 2005). Many additional examples of communities in networks could be provided (Guimerà, Mossa, Turtschi et al., 2005; Porter, Mucha, Newman et al., 2005; Zhang, Friend, Traud et al., 2008; Meunier, Lambiotte, Fornito et al., 2009; Hagmann, Cammoun, Gigandet et al., 2008; Onnela, Saramäki, Hyvönen et al., 2007; Kashtan and Alon, 2005).

It is clear that communities are frequently present in networks, and often have a very natural interpretation. They allow researchers to understand better the network by reducing its complexity. For example, although the network of mobile phone users in Belgium is very complex, its community structure reveals that its primary organization principle is lan-

2

Community detection

guage (Expert, Evans, Blondel et al., 2011). Our goal here is to investigate how such communities might be uncovered. We will first briefly explain the most common method for detecting communities, known as “modularity” in this chapter. We will then derive modularity from a more general framework from which some other methods can also be derived. Some of these methods have some problems, and we will discuss and analyse them in some detail, and provide some solutions in chapter 3. For example, it remains a challenge to see how “granular” partitions should be: is is better to partition the network in many smaller communities, or in a few large communities? We address this choosing of the correct resolution in chapter 4. If negative weights are present in network, modularity (and some variants) do not work well, and we will analyse some possible alternatives in chapter 5. Finally, we will discuss some applications of community detection in chapter 6.

2.1

Modularity Although clustering and graph partitioning have already quite a long history, they are usually not applied to (social) networks. Sociologists have constructed methods known as block modelling (Doreian, Batagelj and Ferligoj, 2005; Wasserman and Faust, 1994), which are closer to “role1 ” detection (Reichardt and White, 2007) than to community detection. Computer scientists have been interested in graph partitioning for quite some time as well (Newman, 2010). But the detection of groups in social networks really started to take off with a seminal paper by Girvan and Newman (2002) in 2002. Especially their follow-up paper (Newman and Girvan, 2004) which introduced a measure known as modularity attracted an enormous interest by a large group of researchers. Originally, they implemented an algorithm based on the removal of edges which are part of many shortest paths (Girvan and Newman, 2002). The idea was that links that fall between communities are part of many such paths, because there are only few links that connect vertices from one community to another. Removing them should then disconnect the network at some point, in which case the communities should become visible. However, it was not clear at which point to stop removing edges. In order to determine this point, they introduced modularity (Newman and Girvan, 1 A role describes nodes that have similar connections to other roles, something closely related to the concept of “regular equivalence” (Wasserman and Faust, 1994; Reichardt and White, 2007).

20

Modularity

2004). This function should give some idea about the quality of a certain partition, and hence a clue as to when the algorithm should stop removing edges. The idea is that communities should have relatively many edges within communities, and only little in between. Let A be an adjacency matrix of some undirected graph, so that Ai j = A ji = 1 if there is an edge (i, j) and zero otherwise. Let us assume we have some fixed partition, and denote by ecd the number of edges between communities c and d, corresponding to a tabulation as follows To community From community

1

2

···

q



1 e11 e12 · · · e1q K1

2 e21 e22 · · · e2q K2 .. .. .. . . . q eq1 eq2 · · · eqq Kq

(2.1)

∑ K1 K2 · · · Kq 2m

Then ∑cd ecd = 2m equals twice the number of edges, since we are dealing with an undirected graph, and we count each edge twice in this manner. We are interested in ∑c ecc /2m the fraction of edges within communities. Looking at this quantity, one already gets an idea of how good the partition is. However, it should be compared to how many edges we would expect to fall between two communities. This is usually done by simply taking marginals—row/column totals—which are Kc := ∑d ecd = ∑d edc , the total number of edges linked to community c, as indicated in Eq. 2.1. Of course then also ∑c Kc = ∑cd ecd = 2m. We thus arrive at the expected number of edges of Kc Kd between communities c and d, which proportional to 2m then becomes Kc Kd /(2m)2 . Since we are only interested in having as many links as possible within a community we arrive at the function "

Q=∑ c

ecc − 2m



Kc 2m

2 # .

(2.2)

The derivation provided here is quick and dirty, and we will see how a more rigorous derivation will also lead to modularity in the next section. This measure seemed to do what was intended. Indeed when there are 21

2

Community detection

relatively many edges within a community, this quantity is relatively high, and approaches 1 for the most modular network possible. If a partition of a network is no better than random then Q ≈ 0. It was thought then that values above about 0.30 would be a sign of modular structure (Newman and Girvan, 2004). Although their original algorithm worked reasonably well, it was quite slow, and quickly faster algorithms appeared (Clauset, Newman and Moore, 2004; Newman, 2004; Duch and Arenas, 2005). But their measure of modularity turned out to be an interesting one. Instead of using it simply to measure how well the network was partitioned, people began to optimize the measure itself (Guimerà and Nunes Amaral, 2005; Newman, 2006; Duch and Arenas, 2005). However, it has some deficits and problems, which we will discuss in the next chapter. But first we will derive this measure of modularity in a more general framework, and go over some of the other possible methods for community detection.

2.2

G = (V, E) graph

A adjacency matrix symmetric transpose

σ membership vector

Canonical community detection In this chapter we will derive modularity in a more general setting, starting from first principles, similar to Reichardt and Bornholdt (2006a). As stated, this more general framework will be used throughout the thesis, and forms the backbone of our analysis. Although not all methods can be represented in this way, it is a reasonably general framework, and we therefore refer to it as the canonical community detection framework. Let us first start with some basic notation. Let G = (V, E) be an undirected graph with nodes V = {1, . . . , n} and E = {(i, j) : i, j ∈ V } the undirected edges of the graph G. Furthermore, we denote by A the adjacency matrix of G, such that Ai j = 1 if there is an (i, j) link, and Ai j = 0 otherwise. For an undirected graph the adjacency matrix A = A> is symmetric where A> denotes the transpose (i.e. A>ji = Ai j ). In addition, each link might have an associated weight wi j ∈ R, which we assume to be positive for the moment (we will consider the possibility of negative weights explicitly in Chapter 5). It might sometimes be useful to have a weighted adjacency matrix where Ai j = wi j when there is an (i, j) link. If we use the weighted adjacency matrix, this will be stated explicitly. The unweighed case then also corresponds to a weight of wi j = 1. We denote the partition by σi ∈ {1, . . . , q} where each σi indicates the community to which node i belongs, so σ is the membership vector. Alternatively, it is sometimes useful to denote communities as sets of nodes. We will 22

Canonical community detection

use C = {C1 , C2 , . . . , Cq } to denote the set of community sets, such that each set Cc = {i ∈ V | σi = c} contains the nodes which belong to community c. Any partition of the graph is assumed to be non-overlapping and complete. Stated differently, every node belongs to a single commuSq nity, in other words, for any valid partition it holds that c=1 Cc = V (all nodes are in a community) and Cc ∩ Cd = ∅ for c 6= d (no node is in more than one community). The size of a community (the number of nodes in a community) will usually be denoted by nc = |Cc |. When referring to “the partition” this might be either to σ or to C , and should be clear from context. We will mostly focus on undirected and unweighed graphs, but most of these quantities can be straightforwardly extended to directed and weighted graphs. Although the overall objective—detect communities—might be clear, what exactly constitutes a community is not undisputed. For example, one can take into account the number of triangles within a community, the size of the largest clique, or k-connectedness, and so forth. For example, traditional clustering works with notions of distance d(i, j) between node i and j (Xu and Wunsch, 2008). We shall start from a first principle basis that is due to Reichardt and Bornholdt (2006a). The basic idea is to only specify the general framework, which can be made more specific, for example by counting the number of triangles or common neighbours. A commonly accepted idea of a community is that it should be a relatively dense subgraph that is relatively well separated from the rest of the graph. This means there should be relatively: 1. many present links within communities; 2. few absent links within communities; 3. few present links between communities; and 4. many absent links between communities. Taking these assumptions, we reward present links (ai j ) and punish absent links (bi j ) within communities, while we punish present links (ci j ) and reward absent links (di j ) between communities. Summarizing, we have the following weights:

δ (σi , σ j ) = 1 δ (σi , σ j ) = 0

Ai j = 1 ai j − ci j

Ai j = 0 − bi j di j 23

C community sets

2

Community detection

where all weights ai j , bi j , ci j , di j ≥ 0 remain to be specified and δ is the Kronecker delta ( 1 if a = b (2.3) δ ( a, b) = 0 if a 6= b δ Kronecker delta

so that δ (σi , σ j ) = 1 if σi = σ j both i and j are in the same community, and 0 otherwise. We then denote by H the objective function h i H(σ ) = − ∑ ai j Ai j − bi j (1 − Ai j ) δ (σi , σ j )+ ij

h

i −ci j Ai j + di j (1 − Ai j ) (1 − δ (σi , σ j )).

The minus sign is only a matter of convention, and in this case we would like to minimize this function. The optimization problem is then min H(σ ),

(2.4a)

s.t. σ ∈ {1, . . . , q}n .

(2.4b)

σ

We will refer to H(σ ) as the cost of a partition σ, and so the optimal partition has minimal cost. Now if we suppose that links within communities should be equally rewarded/punished as links between communities, i.e. ai j = ci j and bi j = di j , we can simplify to

H(σ ) = − ∑ ai j Ai j (2δ (σi , σ j ) − 1) − bi j (1 − Ai j )(2δ (σi , σ j ) − 1). ij

H(σ )

Since we are looking for the minimum of H(σ ) we can remove factors that do not depend on σ, i.e. not depending on δ (σi , σ j ). Furthermore, any multiplication with a constant leaves the minimum unchanged. Using these observations, we can simplify to

H(σ ) = − ∑( ai j Ai j − bi j (1 − Ai j ))δ (σi , σ j ).

(2.5)

ij

This is the objective function we will analyse in this thesis, and forms the core of our enquiry. The weights ai j and bi j remain to be specified, but are assumed to be non-negative ai j , bi j ≥ 0. Irrespective of the specific weights chosen, any community should be connected. To show this, assume on the contrary there is a community C 24

Canonical community detection

which is disconnected, so that for some partition C = S ∪ S0 , with S ∩ S0 = ∅, there are no edges from S to S0 . In that case, if we split the community into S and S0 , we decrease the cost function assuming there is at least one bi j > 0, so that it cannot be optimal. Different choices for the weights ai j and bi j lead to different methods for community detection. For example, we could imagine taking into account the number of common neighbours between i and j for absent links, so that bi j = | N (i ) ∩ N ( j)|, or the number of independent paths between i and j, similar to the original algorithm of Girvan and Newman (2002). Numerous choices could be made, and we will review some of the possibilities.

2.2.1 Reichardt and Bornholdt One choice consists of comparing the original network to a randomized network, a random null model, as considered by Reichardt and Bornholdt (2006a). Let us assume the probability for a link is pi j , which we will specify later. The weight of a missing link is bi j = γRB pi j , while the weight of a present link is ai j = wi j − bi j , where wi j is the weight of the (i, j) link, or wi j = 1 if the graph is not weighed and γRB a parameter used to weigh the importance of the randomized network. Summarizing, the weights are ai j = wi j − γRB pi j ,

(2.6a)

bi j = γRB pi j .

(2.6b)

In other words, whenever a link has more weight than expected in the randomized network, we reward that link if it is within a community. Including a missing link in a community would be punished slightly if the expected weight of a link is low. Working out this choice leads to   HRB = − ∑ (wi j − γRB pi j ) Ai j − γRB pi j (1 − Ai j ) δ (σi , σ j ) ij

  = − ∑ wi j Ai j − γRB pi j δ (σi , σ j )

(2.7)

ij

In the following we will assume that the graph is unweighed and that wi j = 1. We can rewrite Eq. (2.7) slightly to gain some additional insight. 25

pi j link probability

HRB RB model

2

Community detection

We gather the terms per community, and arrive at

H = − ∑( Ai j − γRB pi j )δ (σi , σ j ) ij

= − ∑ ∑( Ai j − γRB pi j )δ (σi , c)δ (σ j , c). c

ij

So if we write ec =

∑ Ai jδ(σi , c)δ(σ j , c) ij

for the number2 of edges in community c and

hec i pi j = ∑ pi j δ (σi , c)δ (σ j , c) ij

for the expected number of edges in community c, we can rewrite Eq. (2.7) as h i H = − ∑ ec − γRB hec i pi j . c

h·i average

Erdös-Renyí graph

In general, the average of some quantity will usually be denoted by h·i In other words, this objective function considers the difference between the actual number of edges within a community and the expected number of edges within a community given a random null model. Hence, there are two ways for improving this function: by having more edges within a community, or by having less expected edges within a community. The expected edges weigh more heavily with higher γRB , so that it effectively constrains the community sizes. But we will get back to this later on. Various random null models can be chosen to specify pi j . One possibility is to take a simple Erdös-Renyí (ER) graph (Bollobás, 2001) where each link3 appears with the same probability p = m/n2 , where m = | E| the number of edges and n the number of nodes. We then set pi j = p =

m . n2

The expected number of edges within a community is then simply

hec i p = pn2c 2 Technically 3 We

26

twice the number of edges in community c for undirected graphs here include the possibility of self-loops

Canonical community detection

where nc is the number of nodes of community c. In this case the density within a community is expected to be about the same as the density of the graph in general. The objective function as a sum over communities then simplifies to h i

HRB = ∑ ec − γRB pn2c . c

However, an ER graph is not realistic in the sense that the degree ki = ∑ j Ai j of a node deviates from what is empirically expected. An ER graph has a Poissonian degree distribution so that Pr(k) =

ki degree

degree distribution

hkik e−hki , k!

while in reality the degree distribution is highly skewed and heavy tailed, and follows more a power law (Newman, 2010) Pr(k) ∼ k−τ . So, another common null model is the configuration model, which takes into account the degree. A simple way to construct a randomized network with the same degrees is to cut all links in half, so that each link has ki stubs (one half of a link), and to connect all the stubs randomly. We then arrive at the expected number of links between i and j of pi j =

ki k j . 2m

(2.8)

The derivation of the quantity is as follows. We have ki ways to choose a stub from node i, since it has ki stubs to connect. Similarly, we have k j ways for choosing to connect to node j. Finally, we choose from 2m stubs (twice for each link). The expected number of links within a community is then

hec iconf =

Kc2 , 2m

(2.9)

where Kc := ∑i ki δ (σi , c) is the sum of the degrees of the nodes in community c. If the total degree is relatively high, we expect more edges to fall within the community. Notice that this no longer corresponds to the 27

configuration model

2

Community detection

density of a community. The objective function becomes   K2 HRB = ∑ ec − γRB c . 2m c

(2.10)

The classical modularity can then be derived by taking γRB = 1, us1 and inverse the sign to ing the configuration model, and normalize by 2m arrive at   ki k j 1 Q= Ai j − δ (σi , σ j ). (2.11) 2m ∑ 2m ij or as a sum over communities, which is sometimes easier to use, "   # Kc 2 ec − , Q=∑ 2m 2m c

(2.12)

and we retrieve the definition provided in Eq. (2.2). 2.2.2 Arenas, Fernández and Gómez A particular problem of modularity (and the RB model in general) is the socalled resolution limit, which we will analyse more in-depth later on (see Chapter 3). The basic problem in the resolution limit is that communities are merged together while they actually shouldn’t. This problem can be addressed to a certain extent by the resolution parameter γRB in the RB model, but other solutions have been proposed. One noteworthy solution by Arenas, Fernandez and Gomez (2007) (AFG) consists of adding selfloops to nodes so as to prevent these nodes from being merged. In other words, they use almost the same weights as RB, but then adapted for the added self-loops of strength γAFG . This idea translates into the weights ai j = wi j − bi j ,

bi j = pi j (γAFG ) − γAFG δi j ,

(2.13a) (2.13b)

where δi j = δ (i, j) = 1 if i = j and zero otherwise. The authors use the classical configuration model for the null-model, and use pi j (γAFG ) = HAFG AFG model

(ki + γAFG )(ki + γAFG ) . 2m + nγAFG

Their model then becomes (up to multiplicative scaling) 28

(2.14)

Canonical community detection

 HAFG (σ ) = − ∑ Ai j wi j + γAFG δi j − pi j (γAFG ) δ (σi , σ j )

(2.15)

ij

which is simply Eq. (2.7) with self-loops added. The benefit of this method is that it leaves unchanged properties that depend on the eigenvectors or on the difference of the eigenvalues. In order to see that, observe that we could also have transformed the original matrix A to A0 = A + γAFG In where In is the n × n identity matrix, i.e. In = diag(1, . . . , 1). Now suppose that λ is an eigenvalue and v the corresponding eigenvector of A (i.e. Av = λv), then also A0 v = Av + γAFG In v = (λ + γAFG )v so that v is an eigenvector of A0 and λ + γAFG an eigenvalue of A0 . Although the same idea could be investigated using the ER null model this has not been considered. Notice that the AFG model is indeed different from the RB null-model and that the two are only equal for γAFG = 0 and γRB = 1 in general.

In identity matrix eigenvalue eigenvector

2.2.3 Ronhovde and Nussinov Ronhovde and Nussinov (2010) (RN) do not include any null model, in order to avoid issues with the resolution limit, and in general set ai j = wi j ,

(2.16a)

bi j = γRN ,

(2.16b)

(although for specific networks, such as with negative weights, they allow some minor changes). Working this out we obtain

HRN (σ ) = − ∑( Ai j (wi j + γRN ) − γRN )δ (σi , σ j ).

(2.17)

ij

Notice that for unweighed graphs (i.e. wi j = 1) up to rescaling this is equal to   γRN δ (σi , σ j ). (2.18) HRN (σ ) = − ∑ Ai j − 1 + γRN ij If we compare this to the RB model with an ER null model, the RN model is equal to the RB model if γRN =

1 − γRB p . γRB

For weighted graphs, the models are not necessarily the same however. 29

HRN RN model

2

Community detection

2.2.4 Constant Potts model A formulation that also has no null model, similar to Ronhovde and Nussinov, but which resembles more closely the RB model is provided by ai j = wi j − bi j ,

(2.19a)

bi j = γCPM ,

(2.19b)

which results in

HCPM CPM model

HCPM = − ∑( Ai j wi j − γCPM )δ (σi , σ j ).

(2.20)

ij

We call this the Constant Potts Model because it only compares the network to a constant parameter γCPM (Traag, Van Dooren and Nesterov, 2011b). As can be expected, this model is rather similar to the RN model and the RB model. The RB and RN model are equivalent if γCPM = γRB p and the ER null model is used. The RN model is only equal to the CPM model γRN for unweighed graphs, in which case we have γCPM = 1+ γRN . 2.2.5 Label propagation Finally, the label propagation (LP) method (Raghavan, Albert and Kumara, 2007) can be shown to be equivalent to the Potts model (Tibély and Kertész, 2008)

H LP LP model

ai j = wi j ,

(2.21a)

bi j = 0.

(2.21b)

which results in the trivially optimized

H LP = − ∑ Ai j wi j δ (σi , σ j )

(2.22)

ij

This model is equivalent to the RB model, the RN model and CPM as long as γRB = γRN = γCPM = 0. This is the least interesting formulation, since there is only one global optimum, namely all nodes belong to a single community, which is trivial. However, the local minima could be of some interest. Furthermore, these local minima can be relatively quickly found, rendering the complexity of the associated algorithm essentially linear (Raghavan, Albert and Kumara, 2007). 30

γRB pi j pi j (γAFG ) − γAFG δi j γRN γCPM 0

wi j − γRB pi j

wi j − bi j

wi j

wi j − γCPM

wi j

Modularity (p. 20)

RB (p. 25)

AFG (p. 28)

RN (p. 29)

CPM (p. 30)

LP (p. 30)

ki k j Ai j wi j − 2m 

ij

− ∑ Ai j wi j δ (σi , σ j )

ij

− ∑( Ai j wi j − γCPM )δ (σi , σ j )

ij

− ∑( Ai j (wi j + γRN ) − γRN )δ (σi , σ j )

ij

− ∑( Ai j wi j + γAFG δi j − pi j (γAFG ))δ (σi , σ j )

ij

ij





− ∑( Ai j wi j − γRB pi j )δ (σi , σ j )

1 2m

Objective function

Overview of different methods

ki k j 2m

ki k j wi j − 2m

Table 2.1

bi j

ai j

Method

Canonical community detection

31

2

Community detection

2.2.6 Random walker There are also some other derivations of modularity (and some of the others models) in terms of a random walk on a graph, by Delvenne, Yaliraki and Barahona (2010). They focus on the time it takes for a random walker to escape from a community. Since a random walker should be trapped within a community for a considerable time, if we try to maximize how long the walker will remain in the same community, we should find communities. random walk

Let us take a look to how we can represent such a random walk on a graph. Suppose we start our walk with a certain probability π (0) in some node, so that πi (0) gives the probability we start in node i. The random walker simply follows each link with uniform probability. So, from a node i, it follows the link (i, j) with probability 1/ki . If we define M = ( D −1 A)> where D = diag(k1 , k2 , . . . , kn ) has the degrees on the diagonal, then Mi j gives the transition probabilities for moving from node i to j. The probability we are in a certain node after a single step is then π (t + 1) = Mπ (t), and so π (t) = Mt π (0). If we assume the network to be (strongly) connected and aperiodic, this matrix is primitive, and according to the PerronFrobenius theorem, in the limit lim π (t) = π = Mπ t

(2.23)

this probability becomes stationary, and π is the dominant eigenvector of M. So, after a sufficient long time, each node will be visited with probability πi .

autocovariance

Now let us give each node some label σi . Suppose the random walker records the labels σi of nodes visited in a random variable Xt , so that if the random walker was in node i after t steps, then Xt = σi . As stated, we would like to know whether the random walker remains in the same community for a long time. Suppose that the label σi of a node indicates the community. If a random walker stays within the same community, the random variable Xt is likely to be the same. This can be measured through the autocovariance between Xτ and Xτ +t with t > 0, which is defined as Cov( Xτ , Xτ +t ) = E( Xτ Xτ +t ) + E( Xt )2 . The expected value of Xt can be easily calculated, if we assume the random walk to become stationary. In that case, E( Xt ) = ∑i σi πi = σ> π = π>σ, 32

Canonical community detection

and so

E( Xt )2 = (σ> π )(π>σ ) = σ> π π>σ . To calculate E( Xτ Xτ +t ) at stationary we obtain that

E( Xt Xt+τ ) = ∑ σi πi ( Mtσ )i = σ> ΠMtσ , i

where Π = diag(π ). We encode σ = Sα where α = (1, . . . , q) and S is the n × q community matrix, such that Sic = 1 if σi = c node i is in community c and 0 otherwise (see also section 2.3.4). We can then write the covariance as Cov( Xτ , Xτ +t ) = α> R(t)α where R( S, t) = S> (ΠMt − π> π ) S is the so called stability matrix. Each element R( S, t)cd denotes the probability to start in community c and go to community d after t steps minus the probability two random walkers are in c and d. Since we are interested in maximizing the time spent inside a community, we would like to maximize R( S, t)cc . In other words, we would like to find max S Tr R( S, t) where Tr X = ∑i Xii is the trace of some matrix X. However, we should remain within the community for all time up to t. So we define the stability of a partition S at time t as r( S, t) = min Tr R( S, τ ). τ c (ΠMt − π t π ) Sc = ∑(Π( Mt )i j − πi π j )δ(σi , σ j ). c

ij

ki . Now suppose we If the random walk is undirected, we have that πi = 2m look at only a single step, or t = 1, so that we obtain that

Tr R( S, 1) =

1 2m



∑ ij

Ai j −

ki k j 2m

 δ (σi , σ j ).

Hence, we recover exactly modularity for time t = 1 on undirected networks. For directed networks this quantity differs from the null model 33

stability matrix

trace

2

Community detection

originally proposed for directed networks (Leicht and Newman, 2008). Approximating this equation around t = 1, a different interpretation of the resolution parameter for the RB model is obtained, namely that γRB ≈ 1/t. However, this only holds approximately. Furthermore, some related type of (continuous time) random walk gives an alternative derivation for the RB model with an ER null model (Lambiotte, Delvenne and Barahona, 2008). 2.2.7 Infomap A quite successful method that unfortunately doesn’t fit within this framework is Infomap (Rosvall and Bergstrom, 2008, 2011). We include a brief description of this method since it is one of the best performing methods outside of this framework, although certainly not the only one (see Lancichinetti, Radicchi, Ramasco et al., 2011; Aldecoa and Marín, 2013). It is based on ideas of information theory, which we will briefly explain. Information theory concerns itself with the representation of information, and naturally involves also the compression of information. For example, if we have a very long piece of text which reiterates “Help! Help! Help! Help! Help!”, it would be more efficient to simply write “Help! (5×)”. In a similar fashion, one can imagine being able to compress other information, which these days is often used when creating .zip files, but also in videos (.mp4), images (.jpg) or music (.mp3). Infomap focuses on trying to compress the list of nodes visited by a random walker on a graph. We record all the nodes a walker has visited, for example “1, 5, 3, 2”, meaning that the walker first visited node 1 then 5, then 3 and finally 2, similar to the random variable Xt in the previous section. If we continue this walk for a very long time, we expect him to spend a reasonable amount of time in the same community. We may use this to represent the list of all nodes the walker has visited in a more efficient way. Hence, the idea of a random walker is similar to the previous section, although the objective is different: previously the focus was on staying in the same community as long as possible, while here the focus is on having a description of the random walk which is as short as possible. Let us first briefly review the basics of information theory. Information theory Information theory mostly deals with how information can be represented and quantified (MacKay, 2003; Cover and Thomas, 2012). The information value of a certain event is logarithmically inverse to the probability of it 34

Canonical community detection

occurring. In other words, suppose that X is a random variable and that Pr( X = x) = p( x), then the information associated with event x is I ( x) = log

1 = − log p( x). p( x)

I ( x) information

(2.24)

This has two nice properties: (1) the information associated with two independent identically distributed events x is then 2I ( x) so contains twice the information; and (2) if x is sure to happen, so when p( x) = 1, it contains no information and I ( x) = 0. The maximum information about a certain event is then when p( x) → 0, which makes sense. After all, if x happens almost never, it provides much information when it actually does happen. Given a certain distribution p( x) we can also ask what is the expected information associated with the random variable X. This measure is also known as the entropy, and can be written as H ( X ) = E( I ( X )) = − ∑ p( x) log p( x).

H ( X ) entropy

(2.25)

x

If we look at the probability of X given Y, or Pr( X = x | Y = y) = p( x | y), the information content associated to x given y is then I ( x | y) = − log p( x | y). The entropy of H ( X | Y = y) is then H ( X | Y = y) = − ∑ p( x | y) log p( x | y), x

hence the conditional entropy is

H (X | Y) conditional entropy

H ( X | Y ) = E( H ( X | Y = y)) = − ∑ p( y) ∑ p( x | y) log p( x | y) y

= − ∑ p( x, y) log xy

x

p( x, y) . p( y)

(2.26)

Notice that if Y and X are independent random variables, then H ( X | Y ) = H ( X ), and otherwise H ( X | Y ) ≤ H ( X ). In other words, conditioning always decreases the entropy. Furthermore, if X is completely determined by Y then H ( X | Y ) = 0, which makes sense since knowing Y we also know X. Similarly, the joint entropy can be defined as H ( X, Y ) = − ∑ p( x, y) log p( x, y),

(2.27)

xy

35

H ( X, Y ) joint entropy

2

Community detection

and hence H ( X, Y ) = H (Y, X ) = H (Y | X ) + H ( X ),

= H ( X | Y ) + H (Y ) .

If X and Y are independent random variables then H ( X | Y ) = H ( X ), and so H ( X, Y ) = H ( X ) + H (Y ). Since H ( X | Y ) ≥ 0, we have H ( X, Y ) ≥ H ( X ) and H ( X, Y ) ≥ H (Y ), and so the joint entropy is always larger than the entropy of a single random variable. iid symbol code

Now suppose we wish to represent a series of random variables, which are independently identically distributed (iid) with distribution p( x). In this context it is common to talk about symbols and a code to represent that symbol. For example, suppose that our distribution gives the symbol a with probability p a and b with probability pb , and likewise pc and pd . We will usually represent codes of symbols in binary code, and so we can represent the symbols by using the following code. Symbol a b c d

Code 00 01 10 11

Here the code length bi = 2 for all codes i. So, the code for the sequence “adba” is then “00110100”. However, if we know that some symbols occur more often then others, we might want to assign shorter codes to symbols that are more often used. For example if the symbols occur with probabilities p a = 0.6, pb = 0.2 and pc = pd = 0.1, we could use the following codes. Symbol Code a 0 b 10 c 110 d 111 Notice that the code for a is shorter b a = 1, but the codes for c and d are longer, bc = bd = 3. The code for the same sequence as before is now “0111100”, which has a total length of 7 bits, while the original code used 8 bits. Notice that we can identify the codes unambiguously, because no code appears in the beginning of another code, a property known as prefix-free. In general, if we look at the expected code length per symbol, 36

Canonical community detection

this is

∑ pi bi = 0.6 · 1 + 0.2 · 2 + 0.1 · 3 + 0.1 · 3 = 1.6 i

using the adapted code, while for the original codes this was ∑i pi bi = 2. So, we improved the representation of this sequence by changing the codes. The idea is now that the number of possibilities for a codeword of a length bi should be inversely proportional to its probability, so that 2bi = 1/ pi , or the number of bits4 bi = − log pi . Rare symbols then get long codes, and often occurring symbols shorter codes. The expected code length per symbol is then

∑ pi bi = − ∑ pi log pi = H (X ). i

i

The amazing thing is that this is also the optimal code length per symbol. In other words, we cannot represent the information in a shorter code per symbol than the entropy. This is known as the famous Shannon sourcecoding theorem (Cover and Thomas, 2012). The actual codes attaining this bound are known as Huffman codes. For our purposes here, we do not need this machinery, and we will not discuss it further. Compressing random walks How can we use compression to find communities? As stated, we expected a random walker to remain in the same community for a substantial amount of time. The ingenious idea is then that as long as we remain in the same community we can use shorter codes for nodes in the same community. That is, we can use the same code for two different nodes in two different communities. Compare it to calling somebody on a land line. If you need to call someone within the same village (or even organisation) you usually only need a few numbers. For example, you dial your best friend with the phone number “1105”. Now if you want to call somebody in another village (with number “38”), you will first have to dial out (using the code “0”), then dial the access code and then the phone number again. For example, your other friend lives in another town and you dial “0-38-1105”. Notice that the actual phone number can be the same for both friends: “1105”. This is the same idea for the random walker: nodes in different communities can reuse the same code. If we do not consider any partition, by Shannon’s source coding theo4 This could be expressed in a different base as well. Since the base only changes the properties up to a multiplicative constant, we ignore this and simply take the natural logarithm.

37

2

Community detection

rem, we can represent the list of nodes visited with H ( X ) = − ∑i πi log πi bits per step, where πi are the stationary probabilities of the random walker as derived in Eq. (2.23). If we do consider a partition σ, we can reuse the same codes for nodes in different communities, which should shorten the average code length for that community. The probability that a random walker stays within a community is then ρc =

ec Kc

where ec = ∑i j Ai j δ (σi , σ j ) the total number of edges as before, and Kc = ∑i ki δ (σi , c) the total degree. The probability to leave a community is then of course 1 − ρc . The probability a certain community is visited is then qc =

∑ πiδ(σi , c). i

We should also define a code for moving outside a community to another community, similar to dialling a “0” for dialling out. We include this code for exiting from community c in the entropy, in order to take it into account. The entropy for moving within a community c (or exiting) is then Hc = − ∑ i

πi πi log qc + (1 − ρc ) qc + (1 − ρc )



1 − ρc 1 − ρc log , qc + (1 − ρc ) qc + (1 − ρc )

so that we can choose optimal codes of average code length Hc for that community. In addition, if the random walker exits from a community, the average code length for indicating to which community the random walker goes is then Hq = − ∑ qc log qc c

With probability qc we then incur the average code length of Hc while with probability (1 − ρ) := ∑c (1 − ρc ) we incur the cost of switching communities. So, the total expected code length is then L(σ ) = (1 − ρ) Hq + ∑ qc Hc .

(2.28)

c

This is known as the map equation, and we try to minimize this expected code length. The derivation here is slightly different from the original (Ros38

Canonical community detection

vall and Bergstrom, 2008), but is similar in spirit. Unlike the other models, we will not analyse this model in great detail, but it is included for the sake of completeness.

2.2.8 Alternative clustering methods As stated earlier, the approach of community detection is somewhat recent, and different approaches have been used before. There exists a multitude of general clustering techniques, such as hierarchical clustering or k-means clustering, which are usually applied to datasets in some Euclidean space (Xu and Wunsch, 2008; Everitt, Landau and Leese, 2001; Kolaczyk, 2009; Jain and Dubes, 1988). By using some graph similarity (or distance) type of measure, it is possible to apply these existing techniques on graphs (Schaeffer, 2007). Hierarchical clustering for example merges two groups depending on the similarity of the two groups (taking a greedy outlook), thus resulting in a dendrogram of merges. The k-means method tries to iteratively minimize the average within cluster distances by minimizing the distance to some cluster average. Similarities between nodes can be derived in many different ways. One such similarity measure can for example be derived by considering the expected commuting time to go from node i to node j in a random walk on a graph (Yen, Fouss, Decaestecker et al., 2009). This can be based on the graph Laplacian, which is defined as

L = D − A,

(2.29)

where A is the adjacency matrix and D = diag(k1 , . . . , kn ) is the diagonal degree matrix. Notice that u> Lu =

∑ ui Li j u j ij

    = ∑ ui δi j ki u j − ∑ ui Ai j u j ij

= ∑ Ai j ( ui − u j )

ij

2

ij

so that L is positive-semidefinite and has only non-negative eigenvalues. We won’t go into the details, but the expected commuting time Ci j to go from node i to node j can be expressed as (Fouss, Pirotte, Renders et al., 39

Laplacian

2

Community detection

2007) Ci j = 2m(ei − e j )L+ (ei − e j )

(2.30)

where ei is the ith basis vector and L+ is the pseudo inverse of the Laplacian 

+

L =

1 L− n

−1

1 + . n

(2.31)

It can be proven that Ci j is a proper distance metric, which can then be used in other clustering techniques for further processing. Another approach also based on the Laplacian is that of spectral graph partitioning (for detail, see Newman, 2010; Bichot and Siarry, 2011). This idea is based on trying to minimize the cut-size. Assume we have some vector s ∈ {−1, 1}n , where si = −1 indicates node i is in group 1 and if si = 1 it is in group 2. Then the total number of edges running between the two groups can be written as 1

1

∑ Ai j 2 (1 − si s j ) = 2 s> Ls.

(2.32)

ij

Realising that 12 (1 − si s j ) = 1 − δ (σi , σ j ), we then recognize the trivially optimized label propagation method (LP) from Eq. 2.22. The trivial solution is simply s = (1, . . . , 1) in which case s> Ls = 0. That is why often in this context an additional constraint is imposed, namely that the two groups should be of roughly equal size. Solving this leads to the eigenvector u2 corresponding to the second-smallest eigenvalue λ2 of the Laplacian L, and setting si = sgn(u2i ). This eigenvector is also known as the Fiedler vector. The first eigenvalue λ1 = 0, and the second eigenvalue λ2 is only zero if the graph is disconnected. For this reason, it is also known as the algebraic connectivity. There are also other variants of spectral graph partitioning, for example based on the normalized Laplacian D −1 L, but we won’t treat them here.

2.3

Algorithms In this section we will review some of the more common algorithms for optimizing modularity (and some of its alternatives). The problem of community detection is NP-hard in general (Brandes, Delling, Gaertler et al., 40

Algorithms

2006), so that there is no (known5 ) efficient (polynomial time) algorithm for optimizing the objective function. The algorithms presented will thus be heuristics, and usually involve some stochasticity. This implies that it will not necessarily always find exactly the same partition. In fact, modularity often seems to have many near optimal partitions, making it difficult to obtain the global optimum, and the other methods are expected to show a similar degeneracy (Good, de Montjoye and Clauset, 2010). In order to test whether an algorithm is working correctly, and performs well, it is useful to construct test networks. These test networks— also known as benchmark networks—are constructed such that the community partition is known beforehand. Comparing the known partition to the partition detected by the algorithm provides evidence of how well the algorithm is performing. We will test some of the methods, and present their results. In spite of the NP-hardness of the problem, and that the algorithms are only heuristic, we will see they work reasonably well. 2.3.1 Simulated annealing Simulated Annealing (SA) is a general optimization technique (Kirkpatrick, Gelatt and Vecchi, 1983). The idea is that the search is allowed to explore a large part of the landscape at the beginning, but as the algorithm progresses, follows more and more the steepest descent trajectory (greedily) towards a (local) minimum. The basic idea is to analyse the difference in the objective function ∆H = Hafter − Hbefore when making a certain change to the partition. We will use ∆H = Hafter − Hbefore throughout this thesis, so that ∆H < 0 will always mean there is an improvement after some change, while ∆H > 0 indicates the prior situation was better (remember we are minimizing H). Such a change can take many forms, but the changes usually considered are: moving a single node from one community to another; merging two communities; or splitting a community. There are several choices available for accepting such a change. The idea is to also accept changes that worsen the partition (i.e. when ∆H > 0) with some probability that decreases as the algorithm progresses. The implementation from Reichardt and Bornholdt (2006a) works as follows. Consider moving node i from community c to d, and let the new communities be c0 and d0 . In terms of the community set we thus have that Cc0 = Cc \ i and Cd0 = Cd ∪ i. The change in the objective function is then 5 It is unlikely that any efficient algorithm will ever be found, part of the famous P = NP problem.

41

Simulated Annealing (SA)

∆H

∆H(σi = c 7→ d) move node

2

Community detection

∆H(σi = c 7→ d) = (eid0 − γRB heid0 i) − (eic0 − γRB heic0 i)

(2.33)

where eic0 = ∑ j Ai j δ (σi , c0 ) is the number of edges from node i to community c0 and heic0 i = ∑ j pi j δ (σi , c0 ) the expected number of edges from i to community c0 , and similarly so for d0 . We consider all communities to which node i is connected, and the associated change in the objective function of ∆H(σi = c 7→ d). We then choose the new community with probability Pr(σi = d) =

Boltzmann distribution

  1 exp −β∆H(σi = c 7→ d) , Z

(2.34)

where Z = ∑d exp β∆H(σi = c 7→ d) is the normalization factor. This is known as the Boltzmann probability distribution (Jaynes, 1957). The parameter β = 1/ T is known as the inverse temperature. A high temperature (low β) gives nearly uniform probabilities, so that every change is chosen with almost equal probabilities. As the algorithm progresses, the temperature is lowered, for example after n changes, usually via T 0 = αT where 0 < α < 1 is some decay factor. Lower temperature leads to more narrow choices, and in the limit of T → 0 only the move(s) with the maximum improvement of the objective function is chosen. An alternative scheme was proposed by Guimerà, Mossa, Turtschi et al. (2005); Guimerà, Sales-Pardo and Amaral (2004). Instead of considering all possible changes, we simply choose a random new community for a node. Similarly, a change can consist of merging two communities. Finally, a change can consist of splitting a community in two. All changes have a certain associated change in the objective function of ∆H and the change is accepted with probability ( Pr(accept change) =

∆H({c, d} 7→ c0 ) merge communities

1 exp(−β∆H)

if ∆H < 0,

if ∆H ≥ 0.

The change for moving a node i from community c to community d is already provided in Eq. (2.33). The change when merging two communities c and d into one new community c0 is then ∆H({c, d} 7→ c0 ) = −ecd + γRB hecd i pi j

∆H(c0 7→ {c, d}) split communities

(2.35)

while the splitting of community c0 into c and d is just the opposite 42

(2.36)

Algorithms

∆H(c0 7→ {c, d}) = −∆H({c, d} 7→ c0 ),

(2.37)

with ecd = ∑i j Ai j δ (σi , c)δ (σ j , d) the number of edges between c and d and hecd i the expected number of such edges. A random split is unlikely to improve the partition, so some additional effort should be made to find a reasonably good candidate split, for example by using the eigenvector split (see Section 2.3.4), but we will not consider that here. For both implementations the general idea remains the same. We consider a number of changes, which are accepted with a certain probability. After a certain number of changes, we lower the temperature, and repeat the procedure. When the objective function is no longer improved, the procedure terminates. The method moving only nodes is provided in Algorithm 1. The exact calculations depend on the null model used. For the configuration null model, we have that hec i = Kc2 /2m, and if we work out we obtain ∆H(σi = c 7→ d) = eid0 − eic0 − γRB

ki (K − Kc + ki ) m d

Kc Kd − ecd 2m Kc Kd ∆H(c0 7→ {c, d}) = ecd − γRB , 2m ∆H({c, d} 7→ c0 ) = γRB

(2.38a) (2.38b) (2.38c)

for respectively joining nodes, merging communities and splitting communities. For the ER null model, with hec i = pn2c where nc is the size of community c, we obtain ∆H(σi = c 7→ d) = eid − eic − γRB p((nd + 1) − (nc − 1)) 0

∆H({c, d} 7→ c ) = γRB pnc nd − ecd 0

∆H(c 7→ {c, d}) = ecd − γRB pnc nd .

(2.39a) (2.39b) (2.39c)

Similar calculations can be derived for the other models. 2.3.2 Greedy improvement Graph partitioning itself is not new, and one heuristic method that has long been used, and which resembles the steps from Simulated Annealing (SA), is Kernighan-Lin (KL) improvement (Kernighan and Lin, 1970). Although in the original formulation two nodes are swapped from their communities in order to keep the community sizes the same, this is not necessary for 43

2

Community detection

Algorithm 1 Simulated Annealing (SA) method function SA(Graph G) initialize σi ← i for all nodes i T ← some high number, β ← T1 while improvement do for all nodes i do Cneigh ← {σ j | (i, j) ∈ E} ∪ σi . Communities of neighbours for all communities d ∈ Cneigh do Pd ← exp(β∆H(σi = c 7→ d)) end for σi ← RANDSAMPLE ( P) . Draw random community end for . Lower temperature T ← α ∗ T, β ← T1 end while return σ end function

modularity optimization. So, the greedy improvement we consider here simply amounts to moving nodes from one community to another6 . The difference with SA is that we choose greedily the best new community. In other words, the method loops (randomly) over all nodes, and determines for each node the community with the largest ∆H. It repeats these steps as long as there remain improvements. More specifically, when considering node i we greedily check the increase in the objective function ∆H(σi = c 7→ d) if the node was moved from community c to d, as was already calculated in Eq. (2.33). Now instead of choosing the new community with a certain probability as defined in Eq. (2.34), we simply choose the community s∗ = arg maxs ∆H(σi = r 7→ s)

(2.40)

which maximizes the change. This can be seen as the limit of the simulated annealing process for which T → 0 (or β → ∞). We consider all nodes (perhaps in random order), and repeat until no further improvement can be made.

6 There are some other greedy algorithms as well, for example (Clauset, Newman and Moore, 2004; Brandes, Delling, Gaertler et al., 2008)

44

Algorithms

Algorithm 2 Greedy method function G REEDY(Graph G) initialize σi ← i for all nodes i while improvement do for all nodes i do C ← {σ j | (i, j) ∈ E} ∪ σi for all communities d ∈ C do ∆d ← ∆H(σi = c 7→ d) end for σi ← arg maxd ∆d end for end while return σ end function

. Communities of neighbours

. Greedily, maximum choice

2.3.3 Louvain method The Louvain method for optimizing modularity (Blondel, Guillaume, Lambiotte et al., 2008) is one of the fastest and best algorithms available for optimizing modularity (Lancichinetti and Fortunato, 2009). It makes changes to the partition similar to the greedy improvement, i.e. it always makes the optimal change at that moment. The trick that makes it so fast and yet work well, is that whenever no more changes can be made by moving nodes, we aggregate the graph, and rerun the same algorithm on the aggregated graph. This is then repeated until modularity can be no further increased. Algorithm 3 Louvain method function L OUVAIN(Graph G) σ ← G REEDY(G) Σ ←σ while improvement do G ← A GGREGATE(G, Σ) Σ ← G REEDY(G) σi ← Σσi for all i end while return σ end function

. Initial Greedy . Use Σ for aggregate . Greedy on aggregate graph . Correct σ according to Σ

The important detail is then of course that moving nodes in the aggregated graph should be equivalent to merging communities in the original 45

Louvain method

2

aggregated community graph

Community detection

graph. Hence, the aggregate method depends on the exact cost function used. Using the configuration null-model allows for a particularly straightforward aggregation. In that case, the new aggregated weighted adjacency matrix A0 is constructed as follows A0cd =

∑ Ai jδ(σi , c)δ(σ j , d) = ecd ij

which simply creates a new node c for each community, and an edge to another new node community d has as weight the total number of edges between community c and d. The essential thing is now that joining two nodes in this graph A0 should be equivalent to merging two communities in A. The benefit for joining nodes c and d in A0 is ∆H = −( A0cd − γRB

kc0 kd0 ) m

which is equivalent to joining communities c and d in A since A0cd = ecd = ∑i j Ai j δ (σi , c)δ (σ j , d) the number of edges between communities c and d and kc0 = ∑d A0cd = ∑i j ki δ (σi , c) is the total degree in community c. Hence, joining two nodes is indeed equivalent to merging two communities as specified in Eq. (2.38b). This special feature of the configuration model (and modularity) allows this formulation to exploit this. Algorithm 4 Aggregation for configuration null-model function A GGREGATE(Graph G, Community σ) A ← A DJACENCY(G) A0cd ← ∑i j Ai j δ (σi , c)δ (σ j , d) return A0 end function When using the ER null model this way of aggregating does not work correctly. Let us assume for an instance that we aggregated a graph according to this method. The benefit of merging node c and d in this aggregate graph, according to the ER null model is then ∆H = Acc + Add − A0cd − γRB p while this should actually be ∆H = Acc + Add − A0cd − γRB pnc nd 46

Algorithms

where nc and nd are the number of nodes in community c and d. Using this method of aggregating then clearly does not work. In order to make this step of aggregating the graph work for the ER null-model we need to introduce the node size. In the aggregate graph, the node size will then represent the number of nodes in the community (i.e. the community size). So, for the initial graph we set the node size to ni = 1 for all nodes, and upon aggregating we will set the node size nc = ∑i ni δ (σi , c) of community c, i.e. the new node in the aggregated graph, equal to the sum of the node sizes within the community. Notice that we can use the same type of aggregation for CPM (and by extension RN). Since we can also apply the greedy algorithm to CPM, the Louvain method is easily applied to CPM as well.

node size

Algorithm 5 Aggregation for ER null-model & CPM function A GGREGATE(Graph G, Community σ) A ← A DJACENCY(G) A0cd ← ∑i j Ai j δ (σi , c)δ (σ j , d) nc ← ∑i ni δ (σi , c) return A0 , n0 end function

2.3.4 Eigenvector We can also take a matrix analysis perspective (Newman, 2006). If we define the modularity matrix B with entries Bi j = ai j Ai j − bi j (1 − Ai j )

(2.41)

and S the n × q community matrix, such that Sic = 1 if node i is in community c and 0 otherwise, we can write our objective function as

H = − ∑ ∑ Bi j Sic S jc = − Tr S> BS, ij

B modularity matrix

S community matrix

(2.42)

c

since Sic S jc = 1 if σi = σ j = c and 0 otherwise, so that ∑c Sic S jc = δ (σi , σ j ), and ∑i Sic Sid = 0 for c 6= d. Here S> denotes the transpose of S (i.e. S>i j = S ji ). Since each node should be in exactly one community, we have the constraint that Sic ∈ {0, 1} and ∑c Sic = 1. From this it also follows that Tr S> S = n and that the columns of S are mutually orthogonal. For undirected graphs B is symmetric (i.e. B = B> ), and we can decom47

transpose

symmetric

2 eigenvalue decomposition orthogonal matrix

Community detection

pose B = UΛU> where Λ is a diagonal vector containing the eigenvalues λ1 ≥ λ2 ≥ · · · ≥ λn with U an orthogonal matrix (i.e. UU> = In is the identity matrix) containing the associated eigenvectors. Plugging this in leads to

H = − Tr S> UΛU> S

= − Tr ΛU> SS> U,

> So, for all λi > 0 we should put as much weight as possible in U> i SS Ui . Without the constraint that Sic ∈ {0, 1} this would be simply optimized by taking the column Si proportional to ui for λi > 0, and the rest 0. Because of the constraints that Sic ∈ {0, 1} this is not straightforward, and usually only a partitioning in two groups is considered. This is known as (recursive) spectral bisectioning. The basic idea is to recursively split communities, until we can no longer divide the sub parts. spectral bisectioning

For spectral bisectioning,it is simpler to use a single vector s to indicate two groups as si = −1 if i is in group 1 and si = 1 if i is in group 2. Then 1 2 (si s j + 1 ) = δ (σi , σ j ), and we can write 1 H = − ∑ Bi j (si s j + 1) 2 ij which is up to a multiplicative and additive constant equivalent to

H = −s> Bs,

(2.43)

with s> s = n. If we relax the problem by allowing s to take on real values, s> Bs is similar to a Rayleigh quotient, for which it is well known that it is maximized by taking s proportional to u where u is the eigenvector associated to λ1 the largest eigenvalue of B. Hence, if we take ( si =

1

if ui ≥ 0,

−1 if ui < 0,

this is the vector s with si ∈ {−1, +1} for which ks − uk is minimal. We can then recursively apply this method to a single community. Let be the nc × nc submatrix of B corresponding to community c. The improvement of H by dividing community c in two, again denoted by the Bc

48

Algorithms

vector s ∈ {−1, +1}nc , can then be described by 1 ∆H = − ∑ Bicj (si s j + 1) − Bicj 2 ij which by removing parts that don’t depend on the optimization reduces to ∆H = − ∑ Bicj si s j = −s> Bc s

(2.44)

ij

similar as before. So, we follow the same procedure. However, we must ensure that the total contribution is positive still, so that ∆H in Eq. (2.44) must obey ∆H = −s> Bc s < −e> Bc e with e = (1, . . . , 1) the vector of all ones. In other words, as long as subdividing puts more weight within the subdivided community as there is in total within the community, we should continue splitting. Notice that this is similar to the condition that ∆H(c0 7→ {c, d}) > 0 for splitting community c0 into community c and d in Eq. (2.37). Furthermore, notice that for the RB model with γRB = 1 we have that e> Be = 0 by definition of modularity, so that we can use the same condition.

Algorithm 6 Recursive eigenvector bisection function E IGENVEC(Modularity matrix B) u ← largest eigenvector of B ( −1 if ui ≥ 0, σi ← 1 if ui < 0. if σ> Bσ > e> Be then Σ1 ← E IGENVEC ( B(σ = −1, σ = −1)) Σ2 ← E IGENVEC ( B(σ = 1, σ = 1)) σ ← Combine Σ1 and Σ2 else σi ← 1 end if return σ end function

. If improvement . Submatrix for σi = −1 . Submatrix for σi = 1 . Otherwise, don’t split

49

2

Community detection

2.4

Benchmarks In order to know whether these algorithms and methods work effectively, we now turn to methods for testing them. This involves two parts. First we have to construct good test networks with some planted partition, so that we can check if some community detection method is able to uncover this planted partition. Secondly, we need some measure to compare the computed partition to the planted partition. Finally, we will provide some results comparing different methods.

2.4.1 Test networks

µ mixing parameter

One of the first problems in generating test networks is that there is no definitely agreed upon definition of a community. However, as stated earlier, there is some consensus on some common features: the communities should be relatively dense, and relatively well separated from the rest of the network. Although specific details might not be agreed upon exactly, this often is the foundation upon which test networks are constructed. Still, we should keep in mind that different definitions of communities or good partitions might yield a partition different from the planted partition. This does not necessarily imply the method does not work correctly, because the definition of community simply differs. Nonetheless, if some method is unable to detect correctly the planted partition whereas other methods do, it does indicate it might not be the appropriate method for these type of test networks. The first to propose such test networks were Girvan and Newman (2002), and remained the common benchmark for some time (Danon, Díaz-Guilera, Duch et al., 2005). In general, test networks are constructed as follows. We wish to build a network of q communities of each nc nodes with average degree hki. The total number of nodes is then n = qnc and the total number of edges m = hkin/2. Furthermore, we would like to control the difficulty of detecting communities. The denser communities are, and the better separated from the rest of the network, the easier it is to detect such communities. Hence, we will introduce a mixing parameter 0 ≤ µ ≤ 1 such that each node will have about (1 − µ )hki edges within its community, and about µ hki edges outside its community. Such a network can be easily constructed as follows. We pick a random node i and with probability µ we will link to a node outside of its community, and with probability 1 − µ we link to a node within its community. We will add in total hkin/2 50

Benchmarks

edges. Easily partitioned networks are constructed using a low µ and this gets progressively more difficult for higher µ. The common test setting introduced by Mark Newman used q = 4 communities of nc = 32 nodes each, with µ varying from 0 to 1. One question concerns until what point µ we expect communities to exist. A reasonable limit is that the average density within a community should be higher than the average density between communities. Beyond this threshold communities become very fuzzy (regardless of the definition) and are unlikely to be detected by any method. Let us first calculate the inner density for a community of size nc . Each of the nc nodes has on average (1 − µ )hki edges within its community, and the density is therefore (1 − µ )hki pin = . (2.45) nc − 1 The rest of the µ hki edges per node will be distributed across the rest of the network. Since these edges get distributed over n − nc nodes, they will be more dispersed in general. The average density is then simply pout =

µ hki . n − nc

(2.46)

A communities of nc nodes in the test network is then well-defined as long as pin > pout , which yields µ
, (3.6) p2c which equals the previous bound in Eq. (3.5) when p = 1 of course. This shows that the resolution limit becomes more endemic if the communities are less dense than cliques. Field of view Another problem that is related to the resolution limit is that modularity is myopic to a certain extent (Delvenne, Yaliraki and Barahona, 2010). The graph exemplifying this problem is the rings of rings, instead of the ring of cliques, displayed in Fig. 3.2. In this case there is a central ring which connects the different rings. Especially if these rings are directed, each ring will look like a community to a random walker. After all, the probability of remaining within a single ring is substantial, with a very low probability of moving from one ring to another ring. Notice that this argument invokes a different conception of a community, namely that it is a subgraph which “traps” a random walker for a substantial amount of time, similar to Infomap (Rosvall and Bergstrom, 2008) and the derivation by Delvenne, Yaliraki and Barahona (2010). Assume we have r rings of nc nodes, where all the rings are connected in one big ring. Then each node has degree ki = 2 except for the outside node, which has ki = 4. We will detail the modularity contribution for a single ring. When keeping the ring as a whole, we arrive at 1 Q(σsingle ) = 2m



(2nc + 2)2 2nc − 2m



+ Qrest

while when splitting the ring we have 1 Q(σseparate ) = 2m

4

(2 n2c )2 (2 n2c + 2)2 −1 − − 2 2m 2m

n

c



!

+ Qrest . 65

3

Scale invariant community detection

Fig. 3.2 Ring of rings

The difference between the two then amounts to   1 n2 + 2nc ∆Q = 4− c 2m m Since we have m = r(nc + 1) links in total, we obtain that as long as 4r < nc

nc + 2 nc + 1

this ring should be split. This implies that graphs that have long cycles or paths may be split into several parts, whereas this might not be appropriate.

3.1.2 Non-locality Whenever a node is added, this might have effects on the other side of the network, i.e. it has a certain ripple effect (Brandes, Delling, Gaertler et al., 2008). More in particular, let us suppose there is a node with degree ki = 1, so that it has only one neighbour (and no self-loop). Suppose the potential community to which it is linked has total degree Kc and ec edges. Then the difference in modularity for putting the node in its neighbours community 66

Issues with modularity

(a) Original network

(b) Node added

Fig. 3.3 is ∆Q =

1 2m

Locality effect

 2−

Kc m



> 0,

so that the node should always be joined to its neighbour. A fortiori, a similar statement holds for node with any degree. Suppose some node i is the only node in a community, with degree ki , and eic edges from i to community c. Then putting i in community c yields a benefit of 1 ∆Q = 2m



k Kc 2eic − i m

 .

h i Since ∑c 2eic − kimKc = 0, the difference ∆Q cannot be negative for all c. So, there is at least one community to where we can move the node. Hence, no community ever consists of a single node. 67

3

Scale invariant community detection

This might have consequences for the rest of the partition, especially in cases where the partition is only slightly preferable to another partition. For example, suppose there are two communities which are linked strongly enough to remain together. Then if we add a single node and link it to a single node in one of the communities, they might suddenly be split. Moreover, if the other community was linked to another community they might suddenly be merged. Hence, the introduction of a single additional node might have consequences reaching beyond the local neighbourhood of the additional node, illustrated in Fig. 3.3. 3.1.3 Spuriously high modularity

tree

Some networks are generally believed to not contain any communities, such as random graphs, cycles and trees. Nonetheless modularity will find clusters, and modularity can be relatively high. Since modularity was in first instance a measure of the quality of the partition, it was believed that high values indicate a strongly modular structure in the network (hence the name). Furthermore, it is normalized so that for the strongest possible modular structure (the ring of cliques) modularity approaches 1. Hence, it might be expected that whenever modularity is high (∼ 1) it is a sign that the network indeed has a significant community structure. For example, Newman and Girvan (2004) suggests that values of modularity are usually somewhere ranging from 0.3 to 0.7 for networks that have some community structure. However, modularity can reach arbitrarily high values, especially on sparse graphs (Bagrow, 2012; Montgolfier, Soto and Viennot, 2011). It can be regarded as a method that focuses on bottlenecks (few outgoing) links, while the actual density is less important (Bagrow, 2012), since this is normalized by the random null model. Hence, the value of modularity itself does not say that much, and should be interpreted with caution. We will see an illustration of how this has been wrongly applied in Chapter 6. Let us start with the sparsest possible connected graph, a tree. A tree is minimally connected, so that if you remove any link, it will be disconnected. Furthermore, it contains no cycle, and if you add any link (without adding a node) it will contain a cycle. This implies there is a single unique path connecting any two vertices in a tree. Finally, a tree of n nodes always has m = n − 1 edges, which can be easily proven by induction. Let us assume we have a tree of n nodes. We want to partition the tree along a reasonable line so as to obtain a lower bound on the modular68

Issues with modularity

ity. Let us consider the node v which splits the network in the most equal connected components if deleted (there might be more, but let us simply choose one). Let us call that the root node of the tree. In other words, the node v which minimizes ∑c n2c where nc is the size of the connected component after deletion of that node v. Let us assume this node has degree k so that there are k components. Now consider the partition that consists of these connected components and the single node v. We know that each connected subgraph of a tree is also a tree, so that each subgraph contains ec = 2(nc − 1) edges. Counting the total degree, this is Kc = 2mc + 1 because it is only connected to the root node. The total modularity is then 1 Q= 2m



∑ c

 Kc2 ec − . 2m

Since we only cut k links, we know that ∑c ec = 2(n − 1 − k). Furthermore, let us assume that nc ≈ nk (which is a good approximation by the fact that v minimizes ∑c n2c ). We then obtain that Kc = 2(nc − 1) + 1 ≈ 2 nk for the k components, while for the root node we obtain Kc = k of course. Working out we obtain, after approximating m ≈ n,

Q=

   1 1 n2 2(n − 1 − k) − 4k 2 − k2 2m 2m k

= 1−

k 1 k2 − + 2 n k 4n

(3.7)

so that for n → ∞, we obtain that Q → 1 − 1k , assuming k remains constant. In fact, this modularity can be increased still by splitting the communities further, i.e. by recursively following the same procedure as long as it improves modularity (Montgolfier, Soto and Viennot, 2011). But this changes little for the asymptotic analysis. Amazingly, this is also the modularity for the most modular network, namely the ring of cliques as mentioned in Eq. (3.1). So, according to modularity the ring of cliques and a tree are both about equally modular (for large n). Hence, even without a clear community structure the modularity is very high. These calculations were made for a specific class of graphs, namely trees. Preferably, one would like to say that the community partition detected is significant. So, it should have a higher modularity than expected for a random graph. This is however not trivial to calculate. Using formalisms from statistical mechanics one is able to find approximate answers 69

root

3

Scale invariant community detection

(Reichardt and Bornholdt, 2007, 2006b), but we will not go into details here. Given a degree distribution with expected degree hki and the av√ erage square-root degree h ki, the expected modularity is

√ h ki Q = 0.97 . hki

This approximation is only good for relatively dense graphs. Whenever hki becomes small, a random graph will contain relatively few cycles, and becomes more and more tree-like, so that the previous results apply. For ER graphs, cycles of all lengths appear simultaneously around hki = 1, and for hki < 1 it will be almost tree like. Summarizing, upon finding some community structure, if somebody wants to comment on how “modular” the network is, the value of modularity should be compared to what can be expected in random graphs. Especially for sparse graphs modularity can become quite high, thereby making it difficult to estimate how significant a certain community structure is. For more dense graphs the modularity becomes lower, since in general it will contain more links between subgraphs.

3.2

Resolution limit in other models Most of the other models somehow try to circumvent the problem of the resolution-limit. Although not all of them were introduced specifically to deal with this issue, how they are affected by the resolution limit has been extensively analysed. Although the problem of the resolution-limit is intuitively clear—it “hides” small communities—it is not entirely clear what the opposite means. We will first discuss how the other models are affected by resolution limit like issues. We will show that most will still show similar issues. In the next section we will make more explicit what is the core of the resolution limit.

3.2.1 RB model Although originally not introduced in order to circumvent the problem of the resolution limit (Reichardt and Bornholdt, 2006a), the resolution parameter γRB in the Reichardt and Bornholdt model, Eq. (2.7), allows to detect communities at different scales. We repeat the same analysis as for modularity, with pi j = 70

ki k j 2m

but with the resolution parameter included.

Resolution limit in other models

The objective function value for single cliques is then

HRB (σsingle ) = −(rnc (nc − 1) − γRB Kc ) with Kc = nc (nc − 1) + 2 as before. When merging cliques we obtain

HRB (σmerge ) = −(rnc (nc − 1) + r − γRB 2Kc ) and so if the difference ∆H = −γRB Kc + r > 0, or γRB Kc < r

(3.8)

it is better to merge the cliques than to separate them. The introduction of the resolution parameter γRB then changes the resolution limit as calculated for modularity. In order to keep the cliques separate the resolution parameter should be increased, while for lower resolution parameters the cliques are merged more readily. Optimizing the number of communities similar √ as before leads to an optimal number of communities of q∗ = γRB m. The corresponding community size limit is then  nc ≥

2m γRB

1

4

,

(3.9)

which can be seen from Eq. (3.8) by using Kc ≈ n2c and r = for merging communities of density pc we arrive at  nc ≥

2m γRB p2c

2m Kc .

Similarly

1 4

.

(3.10)

Again, the introduction of the resolution parameter γRB allows to shift this lower bound on the community size, so that for a higher resolution parameter this decreases the lowest possible community size, while increasing this for lower resolution parameters. So, introducing a resolution parameter does not circumvent completely the resolution limit, but it does allow to detect smaller or larger communities, depending on what one needs. It is also possible to choose other null models, and a common null 71

3

Scale invariant community detection

model is the ER null model using m (n2 ) r(nc (nc − 1)/2 + 1) = . rnc (rnc − 1)/2

pi j = p =

In this case the cost for having cliques as single communities and merging cliques is

HRB (σsingle ) = −(rnc (nc − 1) − γRB prn2c ), r HRB (σmerge ) = −(rnc (nc − 1) + r − γRB p (2nc )2 ). 2 The difference is then ∆H = −γRB rpn2c + r > 0, equivalent to γRB p < 1/n2c so that if 1 γRB (nc (nc − 1) + 2) = γRB Kc < r − , nc the cliques should be merged. The resolution limit for the ER null model is thus the same up to a correction term of n12 . The corresponding limit on c community size is 1  2 1 . (3.11) nc ≥ γRB p More general, one can wonder if there is any null model pi j such that it evades the resolution limit completely. Due to the constraint that ∑i j pi j = 2m this is impossible however since pi j scales with m. So, there will always exist a value of the resolution parameter γRB such that for some combination of q and nc the cliques will be merged. So, even though the resolution parameter helps to look at different scales, it cannot evade the resolution limit, regardless of the null model (Kumpula, Saramäki, Kaski et al., 2007). Upper resolution limit However, something interesting happens with the introduction of the resolution parameter γRB . Whereas the traditional resolution limit signifies a lower bound on the community size—communities smaller than that limit will not be detected—there are also some non-trivial upper bounds on the community size—communities larger than this limit will not be detected. This problem does not present itself in modularity (where the upper bound is trivial), and is only present in the RB model when γRB > 1. This is due to 72

Resolution limit in other models

the fact that the null model then outweighs the empirical networks. This was first observed by Krings and Blondel (2011) although slightly different formulated. The problem in the traditional resolution limit is that of merging communities, but we might analyse similar limits when splitting communities. Again starting from the most modular community, a clique, we analyse when it will be split. When splitting a clique, it is best to split it into single nodes (it is better or equal to the modularity when splitting a clique in multiple parts). Let us analyse a complete clique which is completely separate from the rest of the network. Keeping the clique intact as a single community yields a cost of   n2 (n − 1)2 HRB (σsingle ) = − nc (nc − 1) − γRB c 2 + Hrest 2m while splitting it yields

HRB (σsplit ) = γRB

nc (nc − 1)2 + Hrest 2m

so that we obtain that the difference is ∆HRB = HRB (σsingle ) − HRB (σsplit ) = −nc (nc − 1) +

γRB 3 n (nc − 1). 2m c

Since we want the clique not to be split, we ask that ∆H < 0, so that it is preferable to keep a single community. In that case, we obtain an upper bound on the community size of s nc ≤

2m . γRB

(3.12)

Combining the earlier result of the resolution limit (Kumpula, Saramäki, Kaski et al., 2007) and this upper bound (Krings and Blondel, 2011), we obtain the fundamental community size inequalities 

2m γRB

1 4



≤ nc ≤

2m γRB

1 2

.

(3.13)

Notice that if γRB ≤ 1 that then the upper bound indeed becomes trivial, since by definition the number of edges m is larger than the number of 73

3

Scale invariant community detection √ edges in the clique of size n2c /2, and so that by definition nc ≤ 2m. Whenever γRB ≥ 2m the lower bound becomes trivial, since nc ≥ 1 by definition. Of course, when γRB ≥ 2m then also nc ≤ 1 by the upper bound, so that necessarily nc = 1. In fact, when γRB ≥ 2m the inequalities conflict, and the statement is no longer valid. So, only for 1 < γRB < 2m both bounds are non-trivial and valid, and reduce the size of “visible” communities to the ranges specified. Instead of separating cliques, let us investigate when it is beneficial to split communities of a lower density p. Suppose we have a subgraph of density p which is difficult to split. That is, let us suppose that any partition in two creates subgraphs that have (about) the same density p, and also a density of about p between the two subgraphs. Let us first consider what would be the contribution of this subgraph to modularity. The number of internal edges is then pn2c , which is of course equal to the total degree. We then arrive at a cost of   ( pn2c )2 HRB (σsingle ) = − pn2c − + Hrest . 2m When splitting the graph in two, the number of internal edges is then 2 pn2 p n2c , while the total degree is 2 c . Hence, the contribution for splitting is ! pnc 2  n 2 c − 2 HRB (σsplit ) = −2 p + Hrest . 2 2m Examining the difference we arrive at ∆HRB

pn2 =− c 2



pn2 1 − γRB c 2m

 ,

and so we obtain the upper bound on the community size of s nc
0. (3.16)

This is always the case when γRB < 1/ p and the clique will never be split, while if γRB > 1/ p the clique will always be split. Hence, there is no particular community size nc for which it will be split or not. This points to an interesting difference between the lower bound and upper bound resolution limit. Whereas the lower bound holds regardless of any null model, the upper bound holds only for certain null models.

3.2.2 AFG model The AFG model was introduced specifically to overcome to some extent the resolution limit inherent in modularity (Arenas, Fernandez and Gomez, 2007). Similar to the RB model, varying the parameter γAFG allows one to obtain different views of the community structure, although the two methods are not equivalent (except trivially when γAFG = 0 and γRB = 1, in which case both reduce to modularity). The question is to what extent this method is able to overcome the resolution limit. Let us start again with the traditional ring of cliques. The AFG model can alternatively be written as   (Kc + γAFG nc )2 HAFG = − ∑ ec + γAFG nc − . 2m + γAFG n c For the ring of cliques we have ec = nc (nc − 1) while Kc = ec + 2. The cost for having each clique as a community then is

(Kc + γAFG nc )2 = −r ec + γAFG nc − 2m + γAFG n 

HAFG



while for merging the cliques we have

HAFG

r =− 2



4(Kc + γAFG nc )2 2(ec + 1 + γAFG nc ) − 2m + γAFG n



75

3

Scale invariant community detection

and the difference comes down to   (Kc + γAFG nc )2 ∆H = r 1 − . 2m + γAFG n Since 2m = rKC and n = rnc we obtain that the cliques will be merged (∆H > 0) when Kc + γAFG nc < r (3.17) which is the original limit in Eq. (3.3) up to a correction of γAFG nc of the usual resolution limit of γAFG nc . While this correction was multiplicative using γRB , it is additive using γAFG . The lower bound on the community size is implicitly given by

(γAFG + nc )n3c > 2m

(3.18)

which for nc  γAFG becomes equivalent to the original inequality of nc ≥ 1 1 (2m) 4 . On the other hand if nc ≈ γAFG this amounts to nc ≥ m 4 . So we 1 generally expect the smallest community size to scale as m 4 . Upper resolution limit Let us now analyse whether the AFG model also exhibits an upper bound on the community size. We know that for γAFG = 0 no such bound exists, but for the RB model such a bound exists for γRB > 1, so perhaps for γAFG > 0 this is also the case. Let us again start from a clique completely separate from the rest of the network. This then amounts to

HAFG (σsingle ) = nc (nc − 1) + γAFG nc −

nc (nc − 1) + γAFG nc )2 + Hrest 2m + γAFG n

while splitting into single nodes yields   (nc − 1 + γAFG )2 HAFG (σsplit ) = nc γAFG − + Hrest . 2m + γAFG n So the difference becomes

(nc − 1 + γAFG )2 = nc (nc − 1) 1 − 2m + γAFG n 

∆HAFG 76

 ,

Resolution limit in other models

which gives the upper bound on the community size of nc ≤

p

2m + γAFG n − γAFG + 1. √

(3.19) 2

This bound is √ only non-trivial for 0 < γAFG < −n+ 28m+n , since by definition 1 < nc < 2m. Hence, this restricts the community sizes also to some specific range depending on γAFG . 3.2.3 CPM and RN The method of CPM (Traag, Van Dooren and Nesterov, 2011b) and RN (Ronhovde and Nussinov, 2010) differ from the other two models in the sense that they do not depend on any null model. For non-weighted graphs it can be easily seen that their definitions are equal, and so we will only state the results for CPM here, which is somewhat more elegant in its presentation. The corresponding inequalities for the RN model can be derived γRN using γCPM = 1+ γRN . Finally, the LP method corresponds to γCPM = 0. We again start out by looking at when cliques are merged in the ring of cliques network. We again have r cliques of size nc connected to each other with only a single link. The cost for keeping them separate is then

HCPM (σsingle ) = −r(nc (nc − 1) − γCPM n2c ) while when merging them it is r HCPM (σmerge ) = − (2nc (nc − 1) + 2 − γCPM 4n2c ) 2 = −r(nc (nc − 1) + 1 − γCPM 2n2c ). The difference is ∆HCPM = r(1 − γCPM n2c ), so that the cliques will be merged when γCPM < 1/n2c . As one can see, this no longer depends on the total size of the network in terms of m or n, but only on the “local” variable nc . However, the lower bound on the community size still exists, which is s nc >

1 γCPM

.

(3.20)

The question remains what exactly the resolution limit entails and whether 77

3

Scale invariant community detection

the independence of this inequality on m and n suffices to say a method does not suffer from the resolution limit. We will come back to this question in the next section. We can also look at when two subgraphs of size nc and density p with only a single link in between them will be merged. Doing so yields a cost of HCPM (σsingle ) = 2( pn2c − γCPM n2c ) + Hrest for keeping them separate. Merging them gives a cost of

HCPM (σmerged ) = (2pn2c + 1 − γCPM (2nc )2 ) + Hrest so that the difference yields a lower bound on the community size of s nc >

1 γCPM

.

(3.21)

Surprisingly this bound remains unchanged for different densities. This implies that the community sizes only depend on the resolution parameter γCPM and not on the graph analysed. More general, suppose there are two communities of sizes n1 and n2 , with a density of 2pn1 n2 links in between, so that the density is p, with each e1 and e2 links within the communities, and let us see when they should be merged. Keeping them separate yields a cost of

HCPM (σsingle ) = e1 + e2 − γCPM (n21 + n22 ) + Hrest while, merging them gives a cost of

HCPM (σmerged ) = (e1 + e2 + pn1 n2 − γCPM (n1 + n2 )2 ) + Hrest so that the two should be merged whenever γCPM < p.

(3.22)

This simply states that two communities should always be merged whenever the density of the links between them exceeds the resolution parameter. Vice-versa, the communities should be separated when the density is below this threshold. This provides a quite clear interpretation and definition of a commu78

Resolution limit in other models

nity. If we consider only changes to the partition that consist of moving (a set of) nodes from one community to another, merging communities and splitting communities—in other words, a local minimum of most algorithms considered here—a community should then have 1. a uniform internal density of at least γCPM ; and 2. a uniform external density of at most γCPM to each other community. With a uniform internal density, we mean that for all partitions of the community, there will be at least a density of γCPM link between them. In other words, we should not be able to split a community in two, so that for all proper subsets S ⊂ C where C is the community set of some community, we should have e S,C0 > γCPM (3.23) | S|(|C | − | S|)

where e S,C0 is the number of edges between S and C 0 = S \ C its complement in C. With a uniform external density, we mean that we cannot merge a subset of one community to another community. Suppose S ⊂ C and we consider another community D, then it should hold that e S,C0 − γ | S|(|C | − | S|) > e S,D − γ | S|(| D | + | S|).

(3.24)

If not, we could put set S in community D. This already provides some intuition as to the upper resolution limit. Since each community should have an internal density of at least γCPM , a clique will not be quickly split. Performing the same calculations as before for splitting a clique into separate nodes yields the inequality nc (nc − 1)(1 − γCPM ) < 0

(3.25)

which is always satisfied for γCPM < 1 and never satisfied for γCPM > 1. Indeed, this corresponds nicely with the definition of a community just provided. This implies there is no upper resolution limit. However, a particular problem for CPM is that communities of different densities are difficult to detect simultaneously. Suppose there is a rather sparse community with uniform density p, and two cliques separated by a density of p as well. Then whenever γCPM > p it should merge the two cliques, while if γCPM < p it should split the sparse community. Hence, it is impossible to find a single γCPM such that all communities are detected correctly. On the other hand, when a community has a density p 79

3

Scale invariant community detection

and the cliques are separated with a density of p, it is also a valid question whether they actually constitute good communities. One possible solution is to have somehow different resolution parameters γi j per link (i, j). Summarizing, the bounds for CPM (and by extension RN) do not depend on the actual graph, and there is no upper bound on the community size. This indeed suggests that these methods are less troubled by the resolution limit. In that sense they might be preferable to the other methods, although this might change depending on the needs.

3.3

Scale invariance In the previous section we have detailed quite specifically what the different bounds of the different methods are, detailed in Table 3.1. However, it remains somewhat unclear to what extent these methods suffer from the resolution limit. More specifically, when does a method not suffer from the resolution limit? So the concept of resolution limit free requires a more precise definition. We will develop such a definition in this section, and see it has a natural connection with the scale of the graph. Methods that not suffer from the resolution limit are said to be scale invariant. Moreover, we have seen that some models suffer from a lesser extent to the resolution limit. A natural question is what models do not suffer from the resolution limit? Phrased somewhat differently, what weights ai j and bi j can we choose in the general framework in order to be scale invariant?

3.3.1 Relaxing the null models One of the reasons that modularity and the RB and AFG models suffer from a resolution limit is their dependence on a null model. In the canonical derivation of our framework, it was demanded that ∑i j pi j = 2m. This makes sense, since from the point of view of a random null model we would like to have as many edges in the random graph as in the original graph. However, from the view point of simply specifying some of the weights ai j and bi j we are not constrained a-priori. So, let us relax that constraint for a moment. Consider for example that we take away the dependence on the number of links in the configuration null model, so that we take pi j = ki k j . Of course, this has little sense in terms of a null model, but it simply corresponds to a weight of bi j = γRB ki k j . In other words, the cost of having a missing link in a community is proportional to how many links both nodes have. This is no 80

n

 1 γRB

2

1

1+γRN γRN

2

(γAFG + nc )n3c > 2m  1











2

1

2m + γAFG n − γAFG + 1

2m γRB

– 

(2m) 4 1  2m 4 γRB  1 2 1 pγRB

1

Upper resolution limit (nc ≤ . . .)

Lower resolution limit (nc ≥ . . .)

Table 3.1 Resolution limits of different methods

† Lower resolution limit only given implicitly.

LP

CPM

RN

AFG†

RB with ER null-model

RB with configuration null-model

Modularity

Method

Scale invariance

81

3

Scale invariant community detection

less arbitrary then simply choosing a bi j = | N (i ) ∪ N ( j)| the number of neighbours in common for example. Let us briefly see how such a method using pi j = ki k j would perform on the ring of cliques. Keeping the cliques separate yields

HRB (σsingle ) = −r(ec − γRB Kc2 ) while merging them yields r HRB (σmerge ) = − (2ec + 2 − γRB (2Kc )2 ) = −r(ec + 1 − γRB 2Kc2 ) 2 with the difference ∆HRB = 1 − γRB Kc2 > 0 so that the cliques are merged whenever γRB < Kc−2 .

(3.26)

This also does not depend on the graph under consideration, so this model could also be said not to suffer from the resolution limit. But is this really what we mean by not suffering from the resolution limit? Not all problems have disappeared. Suppose we take the subgraph consisting of only two of these cliques. We analyse when the method would merge the two cliques in this subgraph. The only difference is that in this subgraph Kc0 = Kc − 1 because there is only a single link connecting the two subgraphs. The two cliques will then be merged when γRB < Kc02 = (Kc − 1)2 . Even though neither inequality depends on any global variables, a problem remains. Combining the above two inequalities, we obtain that whenever Kc−2 < γRB < (Kc − 1)−2 ,

(3.27)

the method will separate the cliques in the larger graph, yet merge them in the subgraph. So even though the inequality for merging cliques in Eq. (3.26) does not depend on any global variable, some problems of scale remain. Considering again modularity (or the RB model) this is similar to what happens in the resolution limit. Since the merging of cliques will depend on the size of the graph as a whole, indeed cliques will be merged in some large graph, while in the subgraph they will not be merged. Taking the 82

Scale invariance

same subgraph of two cliques, and taking Kc0 = Kc as before, the cliques will be merged in the large graph and split in the subgraph when r r < γRB < . Kc − 1 Kc

(3.28)

3.3.2 Defining scale invariance The above discussion motivates the following idea for a scale invariant method. The general idea is that when looking at any induced subgraph of the original graph, the resulting partitioning should not change. In order to introduce this definition, let H be any objective function (which we want to minimize), we then call a partition C for a graph H-optimal whenever H(C) ≤ H(C 0 ) for any other partition C 0 . We can then define scale invariance as follows. Definition 3.1. Let C = {C1 , C2 , . . . , Cq } be an H-optimal partition of a graph

G. Then the objective function H is called scale invariant if for each subgraph H induced by D ⊂ C , the partition D is also H-optimal.

Intuitively this means the following. If we take any subgraph induced by the optimal partition, that same partition should be optimal on that subgraph. Since the subgraph is induced by the optimal partition, it can only consist of complete communities; we can’t cut across any communities. This idea is illustrated in Fig. 3.4. Notice that this definition only “works” in one direction. That is, if a method is scale invariant, we know that for all subgraphs induced by the optimal partition, the partition remains optimal on those subgraphs. However, the inverse is obviously not true. Suppose we are given some graphs G1 , . . . , Gq and some optimal partitions on them C1 , . . . , Cq . Then an arbitrary graph G which has all graphs Gi ⊂ G as a subgraph, does not necessarily have the same optimal partition composed of C1 , . . . , Cq . But for the ring of cliques this one direction is all we need. Observe that indeed when a method merges cliques in the ring of cliques network depending on the size of the network it is not scale invariant. To see this, it is slightly easier to consider the chain of cliques—the ring of cliques with one link between two cliques cut out. For some number of cliques r above some threshold r > r∗ it will merge cliques, while for r0 < r∗ it will keep them separate. The graph with r0 cliques is a subgraph of Gr , or Gr0 ⊂ Gr which is induced by its partition of merged cliques C . Indeed the partition D inducing graph Gr0 is no longer optimal, since they are no longer merged 83

scale invariant

3

Scale invariant community detection

Induced subgraph H

Same optimal partition

84

Fig. 3.4 Scale invariance illustration

Scale invariance

in graph Gr0 . Finally, notice that if a method is scale invariant, it will never start merging cliques depending on the number of cliques r. So, this definition indeed accurately captures the core of the resolution limit altogether. This idea is demonstrated in Fig. 3.5. In short, the same partition should then remain optimal for that induced subgraph.

Resolution-limit

Resolution-limit-free

β2 α2

α3 β3

α1 β4

β1 Fig. 3.5 Scale invariance in ring of cliques 85

3

Scale invariant community detection

If the objective function has another property, we can state something interesting, namely that to some extent we can go to the other “direction”. That is, we may exchange parts of optimal partitions. So if we have an optimal partition of the complete graph G, and we find another optimal partition on some (community) induced subgraph H, we may exchange it. Definition 3.2. An objective function H for a partition C = {C1 , . . . , Cq } is called

additive whenever H(C) = ∑i H(Ci ), where H(Ci ) is the objective function defined on the subgraph H induced by Ci .

Notice that CPM and the RN model are both additive objective functions, but that modularity, the RB and the AFG model are not. Although the first is easy to see, the latter is perhaps less clear. The essential notion here is that H(Ci ) is defined on the subgraph H induced by Ci , so that it may not depend on anything outside the subgraph H. The latter models already depend on some global parameters, but even the local dependence on the degree ki renders these method not additive. Now the interesting result is that if we have an H-optimal partition C for an additive scale invariant objective function H, we can replace subpartitions of C by other optimal subpartitions, as already stated informally. Theorem 3.3. Given an additive scale invariant objective function H, let C be an

H-optimal partition of a graph G and let H ⊂ G be the induced subgraph by D ⊂ C . If D 0 is an alternative optimal partition of H then C 0 = C \ D ∪ D 0 is also H-optimal. Proof. Define C 0 and D 0 as in the theorem. By additivity, H(C 0 ) = H(C \ D) + H(D 0 ), and by optimality H(D 0 ) ≤ H(D). Since also H(C) = H(C \ D) + H(D) we obtain H(C 0 ) ≤ H(C), so C 0 is also optimal.

The idea behind this proof is simply the following. Suppose we have an optimal partition C . Then suppose we take a community induced subgraph and have a different optimal partition on that subgraph. Then because of the property of an additive objective function, we can use this optimal partition on the subgraph to replace that part of the partition on the original graph. In terms of the example in Fig. 3.4, this means the following. Suppose that we take the subgraph H as indicated in the figure. If an alternative partition would also be optimal on that subgraph, then replacing that part of the partition in the original graph with the alternative partition would also be an optimal partition on the original graph. For example, if the four communities in the bottom right could be joined to 86

Scale invariance

create an alternative optimal partition in the subgraph H, it would also be optimal to join them in the original graph. Although this might seem to contradict the NP-hardness of community detection methods, this is not the case. It states that when there are two optimal partitions, any combination of those partitions are optimal, so in a certain sense, they are spanning a space of optimal partitions. It does not say whether such a partition can be easily found. Also, there might be two optimal partitions that cannot be obtained by recombining them, because all communities partly overlap with each other. For example, suppose that one optimal C partition is to divide the set of nodes in C1 and C2 , while another optimal partition is C 0 = {C10 , C20 }, where Ci ∩ C 0j 6= ∅. Then both partitions give rise to different induced subgraphs, hence the one cannot be used to replace parts of the other. We can prove that CPM is scale invariant in this sense, just like the RN model and the LP model. The RB model is not scale invariant according to our definition, regardless of the null model (Kumpula, Saramäki, Kaski et al., 2007), and hence modularity is not scale invariant. Furthermore, as we have seen, also when using pi j = ki k j the model is not scale invariant. Finally, the AFG model is not scale invariant either. For scale invariant methods, the results should be unchanged on subgraphs. Hence, we could try to run an algorithm recursively on subgraphs. We could for example consider the following improvement for CPM. First we cut the network at each recursive call, until the density of the subgraph exceeds γCPM . Then, we recombine the subgraphs, and loop over nodes/communities to find improvements until we can no longer increase greedily, and return to the previous recursive function call. These calls should be easily parallelized, making community detection in even larger graphs or in an on-line setting possible. Since the CPM model is also related to the RB model using the ER null model, it is tempting to conclude it is also scale invariant. Indeed, this might be said to be the case, if we choose p independently of the graph, i.e. not define it as p = m/n(n − 1), and simply choose it as some value p ∈ R. However, we then obviously retrieve the CPM model. This shows that scale invariant methods are strongly constrained, and there is only a fine line between resolution-limit and scale invariant methods. These results follow from the more general theorem we will now prove. For this, we first introduce the notion of local weights. Again, building on the idea of subgraphs, we define local weights as weights that do not change when looking to subgraphs. 87

3

Scale invariant community detection

Definition 3.4. Let G be a graph, and let ai j and bi j as in Eq. (2.5) be the associated weights. Let H be a subgraph of G with associated weights ai0 j and bi0 j . Then the weights are called local if ai j = λai0 j and bi j = λbi0 j , where λ = λ ( H ) > 0 can depend on the subgraph H.

Notice that this multiplicative scaling with λ leaves unchanged the optimum of the objective function H. Clearly then, the RN and CPM model have local weights, while the RB and AFG model do not. This definition says that local weights should be independent of the graph G in a certain sense. In fact, it is quite a strong requirement, as it should even hold for a single link (i j) in the subgraph where only i and j are included. That means it can not depend on any other link but the very link itself. Since for missing links, there is (usually) no associated weight or anything, it can only be constant. There are some exceptions, such as multi-partite networks, or networks embedded in geographical space (Expert, Evans, Blondel et al., 2011; Lambiotte, Blondel, De Kerchove et al., 2008), where some meaningful non-constant local weights can be provided. Hence, the RN model and the CPM model are one of the few sensible options available for having local variables. We can now prove the more general statement that methods using local weights are scale invariant. Theorem 3.5. The objective function H as defined in Eq. (2.5) is scale invariant

if it has local weights.

Proof. Let C be the optimal partition for G with community assignments ci , D ⊂ C a subset of this partition, and H the subgraph induced by D with h nodes. Furthermore, we denote by di the community indices of D , such that di = ci for 1 ≤ i ≤ h and by A0 the adjacency matrix of H, so that Ai j = Ai0 j for 1 ≤ i ≤ h. Assume D is not optimal for H, and that D ∗ is optimal, so that H(D) > H(D ∗ ). Then define c∗ by setting ci∗ = di∗ for 1 ≤ i ≤ h and ci∗ = ci for h < i ≤ n. Then because the result is unchanged for the nodes h < i ≤ n, we have that ∆H = H(C) − H(C ∗ ) =

1 (H(D) − H(D ∗ )) > 0 λ

where the last step follows from the locality of the weights ai j and bi j . This inequality contradicts the optimality of C . Hence, for all induced subgraphs H, the partition D is optimal, and the objective function H is scale invariant. The converse is unfortunately not true. Consider a graph G with some 88

Scale invariance

weights ai j and bi j . Then pick a subgraph H induced by some subpartition D , and define the weights ai0 j = ai j and bi0 j = bi j except for one particular edge (kl ), for which we set a0kl = akl + . Then for some  > 0, the original subpartition will remain optimal in H, while the weights are not local. Since the small change of the weight is only made when considering the graph H, all other subpartitions will always remain optimal. Of course, such a definition of the weight is rather odd, so in practice we will never use it.

Even though the converse is not true, we can say a bit more. The weights can be a bit different indeed, but there is not that much room for these differences. We demonstrate this on the ring of cliques. The weights can depend only on the graph, so if G and G 0 are two isomorphic graphs (i.e. they are the same up to a relabelling of the nodes), then ai j ( G ) = ai0 j0 ( G 0 ), where i and i0 are two isomorphic nodes. Hence, only a number of weights can be different from each other in the ring network, as illustrated in Fig. 3.5. All nodes within a clique are isomorphic, except the node that connects to other cliques. So, all the edges among those nc − 1 nodes are similar, and will have the same weight α1 . All edges from these nc − 1 nodes to the “outside” node will have the same weight α2 . Finally, the edge connecting two cliques is denoted by α3 . The missing self-loop for the special outside node is denoted by β2 while the missing self-loop for the other nodes in the cliques is denoted by β1 . Finally, there is (1) a missing link between the outside node and a normal node denoted by β3 ; and (2) a missing link between two normal nodes, denoted by β4 . These weights are illustrated in Fig. 3.5.

Let us now analyse when a method is not scale invariant. Then, the cliques must be merged in some (large) graph, while for the subgraph consisting of these two merged cliques, they should be separated by the method. Or conversely, they should be separated in some (large) graph, but merged in the subgraph. We can write the H(σseparate ) for all r cliques being separate as

H(σseparate ) = −r(α1 (nc − 1)(nc − 2) + 2α2 (nc − 1)

− (nc − 1)β1 − β2 ) 89

isomorphic

3

Scale invariant community detection

and H(σmerged ) for merging all two consecutive cliques as r H(σmerged ) = − 2(α1 (nc − 1)(nc − 2) + 2α2 (nc − 1) 2 − (nc − 1)β1 − β2 + α3 − β3 (nc − 1) − β4 (nc − 1)2 ) Furthermore, for the induced subgraph H consisting of two consecutive 0 for merging cliques, we can write Hs0 for separating the two cliques and Hm 0 0 them, similarly as before, where α and β are the weights for the subgraph H. Then the method is not scale invariant if it would merge the two cliques at a higher level (i.e. when Hm < Hs ) yet would not merge them at smaller 0 ), or vice versa. Working out this condition for scale (i.e. when Hs0 < Hm Hm < Hs (and similarly for Hm > Hs ) gives us α3 > (nc − 1)(β4 (nc − 1) + β3 ), 0 (and similarly for H 0 > H 0 ) we obtain while for Hs0 < Hm s m

α30 < (nc − 1)(β04 (nc − 1) + β03 ). Combining these two inequalities for both cases we obtain α30 (β4 (nc − 1) + β3 ) < α3 (β04 (nc − 1) + β03 ),

α30 (β4 (nc

− 1) + β3 ) > α3 (β04 (nc

− 1) + β03 ).

(3.29) (3.30)

where either Eq. (3.29) or (3.30) should hold. Hence, only if the left hand side equals the right hand side, it does not constitute a counter example. Working out this equality, there are two possibilities. Either the weights should be local, or the following equality should hold nc − 1 =

α3 β03 − α30 β3 . α30 β4 − α3 β04

(3.31)

Obviously, this again constitutes some very particular case of non-local weights. We can repeat this same procedure for other subpartitions, and for other graphs, thereby forcing the weights to be of a very particular kind. This thus leaves little room for having any sensible non-local definition such that the method is scale invariant. This means scale invariant community detection has only a quite limited scope. In fact, CPM seems to be the simplest non-trivial sensible for90

Scale invariance

mulation of any general scale invariant method, although there is some leeway for special graphs (i.e. having some node properties, such as multipartite graphs). This is not to say that methods with non-local weights (e.g. modularity, AFG, number of triangles, shortest path, betweenness) should never be used for community detection at all, they are just never scale invariant.

91

4 I

Finding significant resolutions

this section we will focus on how to determine correct resolution parameters for CPM. Although for the other methods it might also be relevant to determine resolution parameters, they do have some natural resolution parameter, although it might not be the “best” one. For the RB model this is γRB = 1 and for the AFG model γAFG = 0, in which case both of course reduce to modularity. Although different resolution parameters might be chosen—and in the light of the resolution limits perhaps even should be chosen—there at least exists some natural resolution parameter around which to try other resolutions. For CPM this is not the case, since we simply choose some constant γCPM , and so we should need some additional effort in determining when a certain resolution parameter “works well”. Since we will only use the CPM method here, we will use γCPM = γ to avoid cluttering the notation.

4.1

N

Scanning resolution parameter Although we do not have any a-priori idea about a specific resolution parameter, there do exist some simple bounds of course. If we set γ = 0 the only trivial solution is all nodes in a single community. This can also be seen from the condition of merging communities in Eq. (3.22). Assuming the graph to be connected, we know that there are always at least two communities that have at least one edge, and so that the density p between the two communities is at least p > 0 = γ, and so by Eq. (3.22) the two communities should be merged. Since this condition remains true until all communities are merged, we are left with a single large community. The objective function value at this point is then H = − ∑i j Ai j = −2m On the other hand, if γ = 1 all nodes will be in a single community. Applying the merging condition in Eq. (3.22) again, starting from each node in its own community, it is immediately clear that two nodes should never

4

Finding significant resolutions

be merged, since any density p between two communities is never larger than 1, and so p ≤ 1 = γ. The objective function value at this point is then H = − ∑i ( Aii − γ ) = n assuming there are no self loops. So, we know that γ ∈ [0, 1] for unweighed graphs. However, choosing a specific γ is not straightforward. Commonly, it is assumed that “good” partitions are somehow “stable”. For example, one could perturb slightly the network to see if the partition remains the same (Mirshahvalad, Lindholm, Derlén et al., 2012) Another possibility is stability with respect to various stochastic runs (Ronhovde and Nussinov, 2009). If the algorithm returns partitions that are very different, the partition is not very stable, and we might hence expect that the partition is not very good. As before, we could measure the similarity between two partitions using either NMI or VI. Since the VI is not normalized, it is a bit more sensitive to any fluctuations in the partition, and so preferable for this task. So, we might run the algorithm multiple times and see how stable the results are using the VI. Another approach would be to look at the stability of the partition with respect to the resolution parameter γ (Delvenne, Yaliraki and Barahona, 2010). So, if a partition remains optimal over some relatively large range [γ1 , γ2 ], it should indicate it is a relatively good partition. We know that for a certain specific γ communities should have an inner density higher than γ and the density between any two communities is lower than γ. If the same partition remains stable over the range of [γ1 , γ2 ] then we know that the communities have inner density γ2 (for γ > γ2 CPM splits communities) and are separated by a density of γ1 (for γ < γ1 CPM merges communities). Hence, the larger this range over which the partition remains stable, the more clear-cut the community structure. Moreover, it is the ratio γ2 /γ1 between the two parameters that counts, not the absolute difference γ2 − γ1 . After all, if a communities have a density of γ2 = 0.80 and are separated by γ1 = 0.75 this is not quite the same as having a density of γ2 = 0.1 and separated by γ1 = 0.05. Hence, we will usually plot in logarithmic scale. However, if we need to scan the whole range of γ ∈ [0, 1] to some granularity, and also rerun the algorithm multiple times for all values we want to check, this becomes quite computationally intensive. Fortunately, we need not check all values γ ∈ [0, 1]. This is readily clear because there are finitely many partitions, while there are infinitely many values of γ. But there is an even stronger property, namely that the optimal solutions remain optimal for some range (Krings, 2012; Mucha, Richardson, Macon 94

Scanning resolution parameter

et al., 2010). More precisely, if σ is an optimal solution for γ1 and γ2 , then σ is also an optimal solution for all γ ∈ [γ1 , γ2 ]. Theorem 4.1. Let H(γ, σ ) be the CPM objective function. Then if

σ ∗ = arg maxσ H(γ1 , σ ) = arg maxσ H(γ2 , σ ) then σ ∗ = arg maxσ H(γ, σ ) for γ1 ≤ γ ≤ γ2 . Proof. This is a result of the linearity of H(γ, σ ) in γ. To see this, suppose that σ ∗ is optimal in γ1 and γ2 . Let γ = λγ1 + (1 − λ )γ2 with 0 ≤ λ ≤ 1, then by linearity of H(γ, σ ) in γ we have

H(γ, σ ∗ ) = λ H(γ1 , σ ∗ ) + (1 − λ )H(γ2 , σ ∗ ). Since H(γ1 , σ ∗ ) ≤ H(γ1 , σ ) and H(γ2 , σ ∗ ) ≤ H(γ2 , σ ) for any σ,

H(γ, σ ∗ ) ≤ λ H(γ1 , σ ) + (1 − λ )H(γ2 , σ ) = H(γ, σ ), and so H(γ, σ ∗ ) ≤ H(γ, σ ) and σ ∗ is optimal for γ ∈ [γ1 , γ2 ]. That H(γ, σ ) is linear in γ can be seen from the definition. Slightly rewritten we obtain

H(γ, σ ) = − ∑( Ai j − γ )δ (σi , σ j ) ij

= −( E − γN )

(4.1)

where E := ∑c ec the total of internal edges and N := ∑c n2c is the sum of the squared community sizes, and it is immediately clear this is linear in γ. Moreover, it turns out that N is also monotonically decreasing with γ. This makes sense, since with increasing γ, more and more weight is put on N, so to minimize H smaller values of N are needed. This corresponds also to finding smaller communities with increasing γ. Notice that for γ = 0 we have N = n2 , while for γ = 1 we have that N = n. Theorem 4.2. Let σ z = arg maxσ H(γ z , σ ), z = 1, 2. Furthermore, let Nz =

∑c n2c (σ z ) where nc (σ z ) denote the community sizes of the partition σ z . If γ1 ≤ γ2 then N1 ≥ N2 . 95

4

Finding significant resolutions

Proof. Let there be two different optimal partitions σ1∗ and σ2∗ for γ1 < γ2 , with costs

H(γ1 , σ1∗ ) = − E1 + γ1 N1 ,

H(γ2 , σ2∗ ) = − E2 + γ2 N2 . Then since both partitions are optimal for the corresponding resolution parameters we obtain

− E1 + γ1 N1 ≤ − E2 + γ1 N2 ,

− E2 + γ2 N2 ≤ − E1 + γ2 N1 . Summing both inequalities, we obtain

−( E1 + E2 ) + γ1 N1 + γ2 N2 ≤ −( E1 + E2 ) + γ1 N2 + γ2 N1 and so γ1 ( N1 − N2 ) ≤ γ2 ( N1 − N2 ), and since γ1 < γ2 we obtain that N1 ≥ N2 . Notice that if both partitions are optimal for both resolution parameters, then necessarily N1 = N2 , and so also E1 = E2 . Hence, any two equally good partitions, must have the same number of internal edges and squared community sizes. So, denoting by N (γ ) the sum of squared community sizes corresponding to the optimal partition for some γ, we obtain that N (γ ) is a monotonically decreasing function. Because N (γ1 ) = N (γ2 ) if a partition is optimal for both γ1 and γ2 , this is a stepwise monotonically decreasing function. The minimum minσ H(γ, σ ) is hence a piecewise linear monotonically increasing function. Hence, we only need to find those points at which N (γ ) changes, which can be done reasonably effectively using bisectioning on γ. Let us assume we start on some interval [γ1 , γ2 ]. If N (γ1 ) 6= N (γ2 ), we know that N (γ ) = N (γ1 ) for some γ between γ1 and γ2 . So, we can recursively split the interval to check for this γ, up to some |γ2 − γ1 | > δ, or on logarithmic scale. In addition, if we run multiple times the community detection on the values of γ found by this algorithm, we also have some indication of the stability of the partition. Unfortunately, many networks results are often messy, so that it still remains a challenge to choose a “correct” resolution parameter. Nonethe96

Scanning resolution parameter

Algorithm 7 Recursive bisectioning of the resolution parameter function R ES B ISECT(γ1 , γ2 , map N) if | N (γ1 ) − N (γ2 )| >  |γ1 − γ2 | > δ then γmid ← γ1 +2 γ2 N (γmid ) ← C OMM D ETECT (γmid ) R ES B ISECT(γ1 , γmid , N) R ES B ISECT(γmid , γ2 , N) end if end function function G ET R ES N ← empty map R ES B ISECT(0, 1, N, orn logarithmic scale) return N end function

less, this method seems to work quite well on benchmark networks, as displayed in Fig. 4.1. These benchmark networks have n = 103 nodes and have an average degree hki = 10 with a maximum degree of ∆ = 50. The community sizes range between 10 and 100. The exponent of the power law distribution of both the community sizes and the degree sizes was set at τ = 2. It is quite clear that N is stepwise decreasing, and H piecewise linear increasing. The plateaus (indicated by magenta) indeed correspond to the planted partition for the benchmark network. The resolution param∗ eter γCPM we used for testing is also displayed. For µ = 0.1 this parameter falls nicely in the plateau, but for µ = 0.5 the parameter is slightly off. In addition, in the range of the plateau, the VI is relatively low (near 0), indicating the partition is relatively stable. Hence, using such heuristics, it seems possible to scan for “stable” plateaus of resolution values. Even though this might point to resolution parameters γ for which the partitions are somehow “good”, this does not say they are significant. Moreover, we cannot say anything about which resolution level is preferable in some way, and all partitions are (to some extent) valid partitions of the network. So, we cannot say anything about the “correct” or “true” partition, unless there is very clearly only a single resolution parameter which (almost) always returns the same partition. After some reflection, it is ironic we return to the question of what resolution returns a good partition. After all, the initial goal of modularity was in fact to state what partition is especially good. 97

4

Finding significant resolutions

VI

H

N µ = 0.1

µ = 0.5

6

10

∗ γCPM

∗ γCPM

5

10

0.4

104 103

0.6

0.2 10−3

10−2 10−1 γRB

100

10−2

10−1

0 100

γRB

Fig. 4.1 Scanning resolution parameter

4.2

Significance of partition Although modularity compares the number of edges within a community to a random graph, this does not provide any significance of a partition, since random graphs also can have quite high modularity. When thinking about the significance of a partition, modularity goes about it the wrong way around. We do not want to know the probability that random edges fall within the found communities, as done by modularity. Nonetheless, explicitly calculating the actual probability that a partition is as dense as detected seems to yield good results (Aldecoa and Marín, 2011, 2013). Rather, we are interested in the probability that such a dense partition can be found in a random graph. Comparing the observed modularity to the expected modularity for a random graph gives some idea of the significance of a partition (Reichardt and Bornholdt, 2006b). But preferably this should be made more specific. More in particular, let E be again the number of edges within communities for the whole partition. Then we are interested in the probability that a random graph (with the same number of edges and nodes) contains a partition with at least E edges within communities. Notice that this is quite different from the probability that a random partition contains at least E edges, which is basically what modularity does. Unfortunately, this probability is reasonably difficult to calculate, but 98

Significance of partition

we can break it down in some parts. Let us focus on the question of the probability of finding a certain dense subgraph within a random graph. Once we have the probability of finding a certain dense subgraph, we should be able to apply this recursively on the remainder of the graph and partition. That is, once we know the probability to find a community C, we look at the complementary graph with nodes V \ C, and ask what the probability is to find some community in that graph. Unfortunately, we cannot provide the exact probabilities, but obtain some insightful asymptotic results. In addition, the dominant terms of the asymptotic results suggest some approximation of the probability of finding a dense partition in some random graph. This can be used to determine which resolution parameters are significant, in addition to the previously discussed results on stable plateaus. Preliminaries We are interested in estimating the probability that a certain subgraph is contained in a random graph. When speaking of a subgraph, we usually mean an induced subgraph, that is a subset of nodes, with all the edges of the that subset present in the subgraph. More specifically, a subgraph H such that V ( H ) ⊂ V ( G ) and that E( H ) = {(i, j) ∈ E( G ) | i, j ∈ V ( H )}. So, we are given a certain number of vertices nc and edges mc and are asked what the probability is that a random graph contains an induced subgraph of the specified order with that many edges. For some specific subgraphs, we need to take into account isomorphisms. Here we are only interested in subgraphs with some number of edges, so that we do not need to address this issue. We write G ∈ G(n, p) for a random graph G from G(n, p), such that each edge has independent probability p of being included in the graph, the usual ER graphs. In this section we will use the notation | G | = |V ( G )| = n for the number of nodes and k G k = | E( G )| = m for the number of edges. We write Pr( H ⊆ G(n, p)) for the probability that H is an induced subgraph of a G ∈ G(n, p). Notice that we will always use H ⊆ G to denote the fact that H is an induced subgraph of G. Let S(nc , mc ) = { G | | G | = nc , k G k = mc } denote the set of all graphs with nc = | G | vertices and mc = k G k edges. Furthermore, we use a bit of abusive notation and write Pr( S(nc , mc ) ⊆ G(n, p)) for the probability that a graph G ∈ G(n, p) 99

induced subgraph

Erdös-Renyí graph

| · |, k · k

4

Finding significant resolutions

contains one of the graphs in S(nc , mc ), i.e. Pr( S(nc , mc ) ⊆ G(n, p)) = Pr(

[ H ∈ S(nc ,mc )

H ⊆ G(n, p)).

Notice that whenever n = nc we obtain the ordinary binomial probabilities  nc  nc ( 2 ) mc Pr( S(nc , mc ) ⊆ G(nc , p)) = p (1 − p)( 2 )−mc . mc Let us denote by X the random variable that represents the number of occurrences of a subgraph with nc vertices and mc edges in a random graph. Let XH be the indicator value that specifies whether a subgraph H of order nc = | H | in the random graph equals one of the graphs in S(nc , mc ), so that ( XH =

1 0

if ∃ H ∈ S(nc , mc ) otherwise

which of course comes down to ( 1 if k H k = mc and | H | = nc XH = . 0 otherwise

Markov’s inequality

We can then write X = ∑ H XH where the sum runs over all (nnc ) possible subgraphs H. Obviously then, X is a non-negative random variable and Pr( X > 0) = Pr( S(nc , mc ) ⊆ G(n, p)). We will rely on two useful inequalities: Markov’s inequality Pr( X ≥ a) ≤

Chebyshev’s inequality

E( X ) , a

which for us will be most useful in the form Pr( X > 0) = Pr( X ≥ 1) ≤ E( X ), and Chebyshev’s inequality Pr(| X − E( X )| ≥ λ ) ≤

E( X 2 ) − E( X ) 2 , λ2

or in a form more useful to us h i E( X 2 ) − E( X ) 2 Pr( X = 0) ≤ Pr | X − E( X )| ≥ E( X ) ≤ . E( X ) 2 100

Significance of partition

This way of estimating probabilities is known as the second moment method. Subgraph probability We here present bounds for estimating the probability of a subgraph with nc vertices and mc edges occurring in a random graph. We start off with a particular easy one. But first, let us analyse E( X ). Here it is convenient to define r = Pr( S(nc , mc ) ⊆ G(nc , p)). Theorem 4.3. The expected number of occurrences of an induced subgraph can be

written as

  n E( X ) = r nc

(4.2)

Proof. By linearity of expectation, we have E( X ) = ∑ H E( XH ), and because XH is an indicator variable E( XH ) = Pr( XH = 1). Notice that H has nc nodes, so that H ∈ G(nc , p), and Pr( XH = 1) = r. There are (nnc ) subgraphs of nc nodes in a graph with n nodes, which concludes the proof. Using Markov’s inequality, this leads to the following bounds. Theorem 4.4. The probability that G(n, p) contains an induced subgraph with nc nodes and mc edges can be bounded by n

1 − (1 − r)b nc c ≤ Pr( S(nc , mc ) ⊆ G(n, p)) ≤

  n r. nc

Proof. The upper bound is immediate from Theorem 4.3 and Markov’s inequality. For the lower bound, consider a partition of G ∈ G(n, p) into equal parts H1 , . . . , Hk of size nc , for which k = bn/nc c. Again, for each of these parts, the probability to have mc edges Pr( XHi = 0) = 1 − r, and the probability that none of these parts have mc edges is (1 − r)bn/nc c , since they are independent. Hence, the probability that Pr( X = 0) ≤ ( 1 − r )bn/nc c . In order to improve on the lower bound, we need to calculate E( X 2 ). The idea here is to calculate the expected value of the number of pairs of subgraphs that have mc edges. If the two subgraphs are independent this average is fairly simple to calculate. In the case of overlap between the two this is more complicated. Nonetheless, we can then separate into three parts: the parts of the two subgraphs without overlap, and the part that overlaps. Working this out brings us the following lower bound. 101

4

Finding significant resolutions

Theorem 4.5. The probability that G(n, p) contains no induced subgraph with nc nodes and mc edges can be bounded by

Pr( S(nc , mc ) * G(n, p)) ≤ min((u2 ),mc ) 

∑ m(∆)

with M(u) =

1 E( X )

   nc n − nc ∑ nc − u u≥1 u

 M(u) pmc −m(∆) (1 − p) M(u)−(mc −m(∆)) . mc − m(∆)

(4.3)

nc (nc −1)−u(u−1) . 2

Proof. The variable X 2 can be decomposed into parts XH × XH 0 , such that we need to investigate the probability that both H and H 0 have mc edges. So, we can separate this expectancy in parts of partially overlapping subgraphs, like

E( X 2 ) = ∑



u | H ∩ H 0 |=u

Pr(k H k = k H 0 k = mc ),

(4.4)

where u represents the overlap between the different subgraphs. If H and H 0 are (edge) independent, so when u < 1, the answer is simple, and is given by Pr( XH = 1)2 . For u ≥ 1 the answer is more involved. So let us consider two subgraphs H and H 0 such that | H ∩ H 0 | = u ≥ 1. Let us separate this in three independent parts, the overlap ∆ = H ∩ H 0 , and the remainders A = H − ∆ and B = H − ∆. Clearly then, |∆| = u, and | A| = | B| = nc − u. The probability that k H k = k H 0 k = mc can then be decomposed in the probability that the sum of these independent parts sum to m. The probability that k H k = mc can be decomposed as Pr(k H k = mc ) =

∑ m(∆)

Pr(k∆k = m(∆)) Pr(k H k = mc | k∆k = m(∆)).

where m(∆) signifies the number of edges within ∆. Similarly, we arrive at the conditional probability for both subgraphs H and H 0 . However, since we have conditioned exactly on the overlapping part, the two remaining 102

Significance of partition

parts are independent, and we can write Pr(k H k = k H 0 k = mc | k∆k = m(∆)) =

Pr(k H k = mc | k∆k = m(∆))2 .

This probability can be calculated and yields Pr(k H k = mc | k∆k = m(∆)) =   M(u) pmc −m(∆) (1 − p) M(u)−(mc −m(∆)) , mc − m(∆) where M(u) =

nc (nc −1)−u(u−1) . 2

Pr(k H k = k H 0 k = mc ) = 

We then obtain

∑ m(∆)

Pr(k∆k = m(∆))

M(u) mc − m(∆)

2

p2(mc −m(∆)) (1 − p)2M(u)−2(mc −m(∆))

which leads to 

   M(u) (n2c ) mc (n2c )−mc p (1 − p) ∑ m c − m ( ∆ ) pmc −m(∆) mc m(∆)

(1 − p) M(u)−(mc −m(∆)) , where m(∆) ranges from 0 to the minimum of mc and the number of possible edges (u2 ).

Now counting the number of subgraphs that overlap in u nodes, for each choice of subgraph H, we choose u nodes in H, and nc − u nodes in the remaining n − nc nodes. In total, there are then     n nc n − nc Cu = nc u nc − u overlapping subgraphs with u nodes in common. Concluding, we arrive at E( X 2 ) = ∑ Cu Pr(k H k = k H 0 k = mc | | H ∩ H 0 | = u). u

103

4

Finding significant resolutions

Writing this out, we see that    nc n − nc E( X ) = E( X ) ∑ nc − u u≥1 u 2

min((u2 ),mc ) 

∑ m(∆)

 M(u) pmc −m(∆) (1 − p) M(u)−(mc −m(∆)) + E( X )2 , mc − m(∆)

where the last term E( X )2 comes from the non-overlapping part. Working out the Chebyshev inequality, we obtain the inequality stated in the theorem. Asymptotic analysis We focused on subgraphs of a fixed size nc in the previous section. However, for asymptotic analysis, this is not interesting, as it is already clear that all fixed size subgraphs are contained in the random graph asymptotically. So let us consider subgraphs of size proportional to n, so that it is of size sn, with 0 < s < 1. Of course, then mc should also grow accordingly, and we consider the subgraph with a fixed density q. For the asymptotic analysis, we can afford to be a bit sloppy with this density, and consider (sn)2 possible edges in the subgraph of sn nodes, so that mc = q(sn)2 , and we now denote by S(n, q) the subgraphs with density q instead of the actual number of edges. Using the previously calculated bounds, we can then prove the following asymptotic statement. Theorem 4.6. Asymptotically almost surely, no graph contains subgraphs of size

sn, with 0 < s < 1, with density q 6= p, and will contain subgraphs of density q = p of any size, i.e. ( lim Pr( S(sn, q) ⊆ G(n, p)) =

n→∞

Stirling’s formula

0 if p 6= q

1 if p = q

(4.5)

Proof. We will first prove the 0-statement, for which the upper bound suffices. Applying Stirling’s formula to (nnc ) we obtain

√     n  n n c exp nH ∼ p n nc 2πnc (n − nc ) 1 = p exp(nH (s)), 2πs(1 − s)n 104

Significance of partition

where H ( p) is the binary entropy

binary entropy

H ( p) = − p log p − (1 − p) log(1 − p).

(4.6)

Working out yields   exp nH (s) + (sn)2 H (q) q(sn)2 2 p E( X ) ∼ p (1 − p)(1−q)(sn) , 2πsn s(1 − s)q(1 − q)n or

  exp nH (s) − (sn)2 D (q, p) p , E( X ) ∼ 2πsn s(1 − s)q(1 − q)n

utilising the binary Kullback-Leibler divergence (Cover and Thomas, 2012) D (q, p) = q log

q 1−q + (1 − q) log . p 1−p

(4.7)

Since D (q, p) > 0 for p 6= q we can conclude that E( X ) → 0 for n → ∞ when p 6= 0. We need the second moment for the lower bound. This can be rewritten as ∑u ∑m(∆) f (u, m(∆)) with  f (u, m(∆)) =

sn u



(1 − s)n sn − u



 2 (sn)2 − u2 p−m(∆) ( 1 − p )−u +m(∆) q(sn)2 − m(∆)    n (sn)2 sn q(sn)2

Using the notation u = αsn and q(sn)2 − ∆ = β((sn)2 − u2 ) this becomes  f (α, β) =

sn αsn



  (1 − s)n (1 − α 2 )(sn)2 s(1 − α )n β(1 − α 2 )(sn)2    n (sn)2 sn q(sn)2 p−(q−β(1−α

2 ))(sn )2

(1 − p)(q−β(1−α

2 )−α 2 )(sn )2

Taking logarithms on Sterling’s approximation, we obtain      n k log = O nH , k n 105

Kullback-Leibler divergence

4

Finding significant resolutions

Applying this approximation, we obtain    h  (1 − α )s log( f (α, β)) = O n sH (α ) + (1 − s) H − H (s) + 1−s  1−p n2 s2 (1 − α 2 ) H (β) + (q − β(1 − α 2 )) log − p α 2 log(1 − p) − H (q)

i

.

Using again the binary Kullback-Leibler divergence D ( p, q), we can simplify this to h i log( f (α, β)) = O nQ + n2 s2 ( D (q, p) − (1 − α 2 ) D (β, p)) ,     (1−α )s with Q = sH (α ) + (1 − s) H − H ( s ) . The range over which α 1−s and β can vary are as follows. Since u ranged from 1 to nc = sn, α ranges from 0 to 1. The range of β depends on α:   q − α2 q  2    1 − α 2 , 1 − α 2 if α < q β∈     q   0, if α 2 ≥ q 1 − α2

.

Notice that we are interested in the case that p = q, so that D (q, p) = 0. Then D (β, p) > 0 for α < 1 because of the range of β, and Q < 0 if α = 1 because H (s) > 0 for 0 < s < 1, so that Pr( X = 0) → 0 as n → ∞ for p = q. This suggests that any partition (in a finite number of communities) of the random graph will asymptotically contain only communities of density approximately p. This matches some results on community detection on random graphs using CPM. Whenever γ < p −  only a single community will be detected, while for γ > p +  only communities consisting of only single nodes will be detected, while for p −  ≤ γ ≤ p +  a transition takes place where several communities are detected with density approximately p. This transition interval shrinks with increasing n, so that  → 0 for n → ∞, consistent with the asymptotic analysis provided here. The only difference of course is that for γ relatively high, we start to divide into a number of communities that grows with n, so that the limit is no 106

Significance of partition

n = 103 n = 104

1

N/n2

0.8 0.6 p 0.4 0.2 0 10−3

10−2

10−1

100

γCPM

Fig. 4.2 Resolution profile for ER graph

longer correct. Nonetheless, it explains reasonably well the transition, and is illustrated in Fig. 4.2. Here, the transition becomes more clear for larger graphs, and approaches asymptotically the limit at γ = p indicated by the dotted line in the figure. Considering that −(sn)2 D (q, p) dominates both the upper and the lower 2 bound, we can write that Pr( S(sn, q) ⊆ G(n, p)) = eΘ(−(sn) D(q,p)) , where f = Θ( g) is the asymptotic notation to state that f is asymptotically bounded below and above by g. Indeed, this provides the crucial insight into the asymptotic behaviour. For each p 6= q the probability decays as a Gaussian, with a rate depending on the “distance” between p and q as expressed by the Kullback-Leibler divergence. Furthermore, the larger the proportional subgraph as expressed by s, the less likely a subgraph of different density than p can be found. Combining this idea for all communities, the probability for a partition σ with community sizes nc and densities pc should then scale as     nc Pr(σ ) = exp − ∑ D ( pc , p) . (4.8) 2 c Notice that for the two trivial partitions of all nodes in a single community, or every node in its own community, we obtain that Pr(σ ) = 1. This 107

4

Finding significant resolutions

implies that such partitions are never significant, since they can always be found in any graph. We then define the significance as Sig(σ ) = − log Pr(σ ) =

  nc ∑ 2 D ( pc , p) c

(4.9)

for finding significant partitions. Ideally, a significant partition should have a low probability of appearing in a random graph, hence the significance Sig(σ ) should be relatively high.

N

E

Significance

µ = 0.1

VI µ = 0.5

106

0.6

5

10

0.4

104 103

0.2 10−3

10−2 10−1 γRB

Fig. 4.3

100

10−2

10−1

0 100

γRB

Significance for benchmark graphs

For benchmark networks, indeed this measure of significance works quite well, see Fig. 4.3. There, we report the same results as earlier (see page p. 97), but we now include the significance results (referring to Sig(σ )). As we can see, the significance is maximal for the plateau at which we recover the “correct partition”. Nonetheless, the measure indicates that slightly more refined partition (just right of the plateau) are also quite significant. Still, the measure of significance is actually maximal for the plateau. For hierarchical benchmark graph results are similar, see Fig. 4.4. These networks have n = 103 nodes, and each node has a degree of ki = k = 20. There are 10 large communities of 100 nodes each, and each large community consists of 5 smaller communities of 20 nodes each. There we observe two plateaus for µ2 = 0.1 (we have used µ1 = 0.1 for both results), corresponding to the two levels of the hierarchy. The significance of the more 108

Significance of partition

N

E

Significance

µ2 = 0.1

VI µ2 = 0.5

6

10

0.8 105

0.6 0.4

104

0.2

3

10

10−2

10−1 γRB

Fig. 4.4

100

10−1 γRB

0 100

Hierarchical scanning results

refined partition (the second level) is higher however, whereas the more broad partition (the first level) is less significant. This makes sense since the refined communities are very clearly defined, and so are very unlikely to be found in a random graph. The broader communities are also relatively clearly defined, but it contains a refinement that is less likely to be present in a random graph. For µ2 = 0.5 the two plateaus have merged into a single plateau, which is the most significant partition found. Again, this makes sense, since the smaller communities are much less clearly defined, while most links still fall within the larger community (since µ1 = 0.1). The maximal significance attains about 1.4 · 104 for µ2 = 0.5, while for µ2 = 0.1 the maximum is about 3.7 · 104 . This suggest that the communities are more clearly define for µ2 = 0.1 then for µ2 = 0.5, as expected. Hence, the significance of a partition can be quite well used to find out what partitions are relatively significant at what resolution. 4.2.1 Scanning for significance We know how to scan the resolution parameter range without too much calculation by bisectioning. In addition, we have seen that the significance Sig(σ ) has the tendency to be maximal for some interesting partition. Hence, we might alter the bisectioning algorithm somewhat in order to look for the γ that maximizes the significance. So, in this case, we only use the significance to choose a particular value of γ that works “well”. Of 109

4

Finding significant resolutions

course, this only returns a single value of γ, which in addition might be a local optimum. To obtain the full overview of the resolution profile, the scan has to be done over the whole range of γ, as in section 4.1. An alternative approach would be to optimize significance itself, which we will consider in the next section. By bisectioning, we know we don’t have to scan some γ ∈ [γ1 , γ2 ] if N (γ1 ) = N (γ2 ) for some γ1 and γ2 . Hence, this reduces significantly the number of values of γ which we have to scan. If we are only interested in the γ for which Sig(σ ) is maximal, we can additional only scan those ranges for which the significance is maximal. However, recursion is inherently depth first. It tries to bisect as long as necessary some range, and only returns whenever it has reached some limit. In this case, it would be preferable to have a breadth first search, so as to cover a broad range of values. In order to do so, we will rely on a queue instead of recursing, see Algorithm 8.

Algorithm 8 Recursive bisectioning maximizing the significance function S IG R ES(γ1 , γ2 , results) Q ← empty queue Q.push([γ1 , γ2 ]) max_sig ← 0 while not Q.empty do [γ1 , γ2 ] ← Q.pop() results(γ1 ) = G ET R ESULTS(γ1 ) results(γ2 ) = G ET R ESULTS(γ2 ) dN ← | N (γ1 ) − N (γ2 )| dG ← |γ1 − γ2 | mS ← max(sig(γ1 ), sig(γ2 ) if dN >  and dG > δ and mS >= max_sig then max_sig ← mS γmid ← γ1 +2 γ2 Q.push([γ1 , γmid ]) Q.push([γmid , γ2 ]) end if end while end function

110

Significance of partition

4.2.2 Optimizing significance Scanning for a significant resolution, as in the previous section, provides us with a way to choose one of the partitions returned by CPM. However, it might be that there are other partitions, not revealed by CPM, that have a higher significance still. Hence, we might also try to optimize the significance directly. This comes down to using the significance as an objective function instead. Notice that optimizing significance is no longer scale-invariant. After all, given a partition and a graph, pick a subgraph that consists of only a single community. Then the significance Sig(σ ) of that partition, defined on the subgraph equals 0, since D ( pc , p) = 0. This is also the case for all nodes as singleton communities, since then (n2 ) = 0. Since this constitutes the minimum, it is unlikely that no other partition provides a higher significance. In particular, splitting the community in two smaller communities will in general give a non-zero significance. Hence, the same partition no longer remains optimal on all community induced subgraphs, and the method is hence not scale-invariant. Optimizing significance is not too difficult. As before, we look at the difference of moving some node i from a community r to a community s. Let us assume that i has eir edges to community r and eis edges to community s. The increase in significance is then ∆Sig(σ ) =

    nr nr − 1 D ( qr , p ) − D (qr0 , p) 2 2     ns ns + 1 D (qs , p) − D (q0s , p), 2 2

where qr0 =

mr − eir

(nr2−1) ms + e q0s = n +1 is . ( s2 ) We can then perform the same greedy algorithm as before. However, if we also want to aggregate the graph, and then still correctly move communities, we again need the node size ni , similar as for CPM. Suppose we have 111

4

Finding significant resolutions

this node size, then moving a node with size ni amounts to     nr nr − ni ∆Sig(σ ) = D ( qr , p ) − D (qr0 , p) 2 2     ns n s + ni D (qs , p) − D (q0s , p), 2 2 where qr0 = q0s =

mr − eir ni ( nr − 2 ) ms + eis ni (ns + 2 )

.

Hence, we can use this to optimize significance using the Louvain algorithm (Algorithm 3, see p. 45), similar as we did for CPM. The benchmark results are displayed in Fig. 4.5. It is clear that using significance to scan for the best γ parameter for CPM works quite well. In fact, is works better to scan for the best γ parameter then using our precalculated γ ∗ using information about the mixing parameter µ, as done in section 2.4.3. Surprisingly however, optimizing significance itself results in a worse performance than scanning for the optimal γ parameter for CPM. This is presumably due to some local minima in which the significance optimization gets stuck, while this is not the case for CPM. In particular, it is likely that it will find denser subgraphs within the LFR communities, so that it doesn’t find the actual communities. Nonetheless, optimizing significance works reasonably well, and outperforms Infomap in this case.

112

Significance of partition

CPM Significance

CPM Sig Infomap

1 0.8 0.6 0.4 0.2 0

0

0.2

0.4

0.6

0.8

1

µ

Fig. 4.5 Benchmark results for significance

113

5 U

Modularity with negative links

now we have constrained the weights on the graph to be positive (wi j > 0). However, these weights might also be negative, a situation which comes quite natural when studying for example conflict. In these situations any animosity (e.g. war, fighting, conflict or distrust) can be represented by a negative link (some weight wi j < 0) and the opposite (e.g. alliances or friendship) by a positive link (some weight wi j > 0). Although the exact weight of course often plays some additional role, the distinction between positive and negative links is primal. Often we will simply consider negative links as having weight −1 and positive links having weight +1, although most concepts can be easily extended to weighted graphs. These type of networks are known as signed networks (or graphs) (Zaslavsky, 1982). In this chapter we will analyse how this affects the proposed methods and offer some solutions.

5.1

NTIL

Social balance The theory of social balance tries to explain the structure of positive and negative links in signed networks (Cartwright and Harary, 1979, 1956; Harary, 1953; Cartwright and Harary, 1968). The idea is that whenever you are friends with somebody, you and your friend should have rather similar beliefs. Although friends perhaps tend to resemble each other more and more closely, it also works in the other direction: people tend to befriend those whom they share interests with (birds of a feather flock together). This latter process is known as homophily—like for the own kind. Enemies on the other hand should then be expected to think differently. We will elaborate on social balance in chapter 7, and it will be the main focus in the second part. The main result of social balance is that a graph that is balanced can be split into factions. Each faction corresponds to a set of nodes that is

social balance

homophily

5

Modularity with negative links

connected positively, while between factions there are only negative links. The number of factions is related to it being either weakly or strongly socially balanced. For a strongly socially balanced graph, it can be split into (at most) two factions, while a weakly socially balanced graph can be split into (possibly) more factions. More details can be found in chapter 7. The correspondence between factions and communities is clear, and we use the two words interchangeably in this chapter. However, instead of having relatively little links between communities, they should be negative.

5.1.1 Frustration

G ± ,E±

Of course, in reality we do not expect social balance to hold exactly, but only to some degree. A natural question therefore is whether it is possible to cluster a signed graph so that is has the least number of incorrect edges (i.e. positive link between factions or negative link within factions). At this point it is useful to introduce the negative and positive part of a signed graph. Let us denote by G − = (V, E− ) the negative graph and by G + = (V, E+ ) the positive graph, so that E− = {(i, j) ∈ E | wi j < 0}

E+ = {(i, j) ∈ E | wi j > 0}.

(5.1) (5.2)

The adjacency matrices A+ and A− are then defined accordingly, so that Ai+j = 1 whenever (i, j) ∈ E+ and zero otherwise, and similarly Ai−j = 1 if (i, j) ∈ E− and zero otherwise. The original adjacency matrix is then A = A+ + A− . In addition, we will denote the signed adjacency matrix by A˜ = A+ − A− , so that   −1 if (i, j) ∈ E−  A˜ i j = 0 (5.3) if (i, j) ∈ /E   1 + if (i, j) ∈ E We assume that wi j 6= 0 whenever (i, j) ∈ E, so that there are no edges that have zero weight. We also define the positive and negative weights as wi+j = max{wi j , 0} and wi−j = max{−wi j , 0}, so that if wi j > 0 then wi+j = wi j and wi−j = 0 and if wi j < 0 then wi−j = −wi j and wi+j = 0 and

so wi±j ≥ 0. In order to find factions such that there are the least number of 116

Social balance

violating edges, we need to minimize

HSB = ∑ A˜ i j (1 − δ (σi , σ j )). ij

Rewriting this, and removing those parts that do not depend on δ (σi , σ j ) this is equal to minimizing

HSB = − ∑ A˜ i j δ (σi , σ j )

(5.4)

ij

Positive edges between communities and negative edges within communities are said to be frustrated. We also refer to Eq. 5.4 as the frustration, and we would like to minimize it. Notice that if we are looking for only two communities, this reduces to bi-partitioning, which can effectively be done with the spectral method explained in section 2.3.4. We defined a vector s such that si = −1 if node i is in community 1 and si = 1 if i is in community 2. If u is the eigenvector corresponding to the largest eigenvalue, then taking ( si =

if ui ≥ 0

1

−1 if ui < 0

gives a reasonable partition in two groups. In particular, if the network is strongly socially balanced, so that it can be split exactly in two groups, this method will give an exact result (see Theorem 7.10). This can be seen as follows. Let x be a non-zero vector such that x> x = 1. Then ˜ = x> Ax

∑ xi A˜ i j x j . ij

Let xi x j > 0 if A˜ i j = 1 and xi x j < 0 if A˜ i j = −1, so that each xi A˜ i j x j > 0 since the graph is balanced. Suppose u j = x j for all j 6= i but that ui xi < 0. ˜ < x> Ax ˜ which contradicts the fact that u is the eigenvector corThen u> Au responding to the maximal eigenvalue. Hence, indeed, if the graph can be partitioned into two groups, this split will be found exactly by the spectral bi-partitioning. But imagine there are only a few negative links, and many positive links. According to this method, everything that is positively linked should be put in the same community. So, even though there might be communi117

5

Modularity with negative links

ties that are well defined but only positively linked, they will be missed by using this method. So, this method might be too strict. In fact, the LP method has a similar problem (see section 2.2.5 on p. 30). It essentially might put all nodes in the same community whenever they are positively connected. Hence, although this frustration model would indeed minimize the number of frustrated links, it might not be exactly what we want. The method merges communities which are only relatively sparsely connected, while we might be interested in detecting separate communities.

5.2

strength

Weighted models So far we have mostly discussed unweighed models, and simply stated that most models can be easily adapted for weighted networks. Perhaps the problem of negative links is quickly solved by simply allowing negative weights. Let us first consider some of the weighted counterparts of the earlier models. We define si = ∑ j wi j as the strength of a node, as the weighted counterpart of the degree. Moreover, the total weight w = ∑i j wi j = 21 ∑i si is the weighted counterpart of the number of edges. Let us look to the weighted version of modularity for instance. We then arrive at si s j pi j = 2w for the expected weight of link (i, j), similar as before. The complete weighted form of modularity then becomes

Q=

1 2w



∑ ij

Ai j wi j −

si s j 2w

 δ (σi , σ j ).

It is clear that quickly problems emerge if we allow wi j < 0, since it might for example be that w = 0. Moreover, if si < 0 and s j > 0, the expected weight pi j < 0. In fact, even for a trivial example this does not work well. Consider the example provided in Fig. 5.1. The weighted degree of the three nodes a, b and c is s a = 1, sb = 1 and sc = −1. The total weight is w = ∑ wi j = 1. The expected values pi j = si s j /2w equal the edge weights wi j . Hence wi j − pi j = 0 for all links, and each possible community configuration results in a modularity Q = 0, while the appropriate configuration is clear from the figure: a and b belong to the same community, and c to an118

Weighted models

ka = 1

a

b

c

kb = 1

kc = −1

Fig. 5.1 Problem of modularity with negative links

other community. Some modification to modularity is therefore required to detect communities in networks with (also) negative links. Now let us take a look at the RB model, which for the configuration model gives largely similar issues as the modularity. But perhaps the ER null-model is less sensitive to issues of this kind. Let us define p = w/(n2 ). This amounts of course to a CPM with a rescaled resolution parameter, which is slightly easier to consider. The total weight inside a community is then given by ec = ∑i j wi j δ (σi , c)δ (σ j , c), and the weighted density by pc = ec /(n2 ). In this case, communities should simply have a weighted density of pc > γRB p, while the density between communities c and d should be pcd < γRB p. Notice that for either null-model, using γRB = 0 we arrive at the earlier model of frustration. Let us try to repair the deficits of modularity in case there are negative links. In general we could write

H = −H+ + H−

(5.5)

where H+ is the objective function defined on the network of positive links and H− on the networks of negative links. The contribution for the negative links H− is the opposite of that of positive links H+ since we want to minimize the number of negative links within a community instead of maximize them. Choosing different H± leads to different community detection methods, similar as before, but adapted for when negative links are present. Not all models necessarily have problems with negative weights, and let us briefly review which ones do and which don’t. Let us first work out 119

5

Modularity with negative links

the RB model, which then becomes + + HRB = − ∑(wi+j Ai+j − γRB pi j )δ (σi , σ j ) ij

− − + ∑(wi−j Ai−j − γRB pi j )δ (σi , σ j ). ij

since wi j = wi+j − wi−j and either Ai+j = 1 or Ai−j = 1 we can simplify to + + − − HRB = − ∑(wi j Ai j − (γRB pi j − γRB pi j ))δ (σi , σ j ). ij

For the configuration null-model this gives

HRB = − ∑ wi j Ai j − ij

k+ k+ + i j γRB 2m+

!! k− k− − i j − γRB δ (σi , σk ). 2m−

(5.6)

So, when distinguishing negative and positive links, using the configuration null model is only equivalent to the original method when k+ k+ + i j γRB 2m+

k− k− − i j − γRB 2m−

= γRB

− (ki+ − ki− )(k+ j − kj )

2(m+ − m− )

which in general will not be the case. However, when using the ER nullmodel, we arrive at + + − − HRB = − ∑(wi j Ai j − (γRB p − γRB p ))δ (σi , σ j )

(5.7)

ij

γ + p+ −γ − p−

+ + − − so that whenever γRB p − γRB p = γRB p or when γRB = RB p RB the original method is equivalent. Similarly for CPM, the original method is + − . − γCPM equivalent when γCPM = γCPM

One might wonder whether it is not simply an issue of shifting the adjacency matrix A by some constant in order to make it positive. Let us briefly reflect on this possibility. We thus have the following shifted weighted adjacency matrix A0 = A + c for some constant c ≥ 0 such that Ai0 j ≥ 0 for all i j. We already saw that modularity has some issues with negative weights, so maybe they’ve disappeared when simply shifting the matrix. Indeed the example on Fig. 5.1 can be trivially repaired for modularity by simply shifting the matrix with a constant c = 1. However, in general, this way 120

Implementation & benchmark

of repairing things does not coincide with our solution in Eq. 5.5. However, for CPM (and so by extension RN and the RB method with the ER null model), this simply corresponds to a shift in the resolution parameter γCPM , which is not the case for modularity. Arguably, if a partition is optimal when shifting the matrix, but not according to Eq. 5.5, it does not seem to constitute a good partition. Nonetheless, we might wonder if there always exists some c such that the partition is optimal for both modularity on a shifted matrix and for Eq. 5.5. This remains an open question, but given the problems of modularity described in Chapter 3, it is doubtful. At any rate, modularity is not simply shift invariant in this sense, whereas CPM is shift invariant (up to a concomitant shift in the resolution parameter).

5.3

Implementation & benchmark The implementation of the negative links is not too difficult in most algorithms reviewed in section 2.3. We already briefly saw the application of the spectral bisectioning, which is easily applied to any matrix. For the other algorithms we have to make a small change however. Let us review the greedy method, which forms the core of the Louvain method, for negative links. Let us take the RB model with the configuration null-model as an example. The change when moving node i from community c to community d is in general then h i + + − − ∆H(σi = c 7→ d) = (eid − γ heid i pi j ) − (eid − γ heid i pi j ) − h i + + − − (eic − γ heic i pi j ) − (eic − γ heic i pi j ) . Earlier however, it was clear that a community needed to be connected, and so it made sense to only consider the communities of neighbours. This is no longer the case unfortunately when introducing negative links. After all, suppose for example that ki+ = 0, node i has only negative links. In − − that case we seek to minimize eic − γ heic i pi j which probably happens when − eic = 0. Hence, when negative weights are included, we are obliged to loop through all communities, not only the communities of neighbours. So the greedy method should be only slightly adapted, and is displayed in Algorithm 9. Another small change in the implementation that makes it slightly easier to work with negative links is to work with layers. This can then also be easily extended to work with more complicated graphs, with multiple 121

layers

5

Modularity with negative links

Algorithm 9 Greedy method for negative links/multiple layers function G REEDY(Graph G) initialize σi ← i for all nodes i while improvement do for all nodes i do for all communities c do . All communities ∆c ← ∑` ∆H` (σi = r 7→ c) . Sum over all layers end for σi ← arg maxc ∆c . Greedily, maximum choice end for end while return σ end function

types of links, or multiple types of models for different layers. In general, the idea is to have different graphs G1 = (V, E1 ), G2 = (V, E2 ), . . ., with the same nodes in it, and that we calculate the cost by summing the objective function for these different layers. Each layer only contains positive weights. So if the original graph G contains both positive and negative links, we split it in a positive part G + and G − as stated earlier, which represent our layers G1 and G2 , and we keep track of which layer contains the negative links, so that we try to maximize that objective function, instead of minimize it. If we have a dynamic graph so that at different times there are different edges present/absent, we can use a similar technique. Normally some links between graphs at consecutive times are added, so as to obtain a dynamic view of the partition (Mucha, Richardson, Macon et al., 2010). In that way, we can keep most of the original implementation details. Specifically, for the Louvain method, this way of implementing allows to keep the same functions for aggregating the graph (layers) as before. In order to see if a method is performing well, we need to adapt the benchmark networks slightly. We can do so by first generating an ordinary benchmark, so that with probability µ links fall within a community, and with probability 1 − µ they fall outside a community. We introduce also the mixing parameter µ SB , so that with probability µ SB a link within a community is positive, and with probability 1 − µ SB such a link is negative. Similarly for links outside a community, with probability µ SB this is a negative link, while with probability 1 − µ SB this is a positive link. So, for µ SB = 0 all links within communities are positive and all links between communities negative. 122

Implementation & benchmark

t=0

Ars,i

At,ij

t=1

t=2 t=0

t=1

t=2

(a) Slices (b) Layers

Fig. 5.2 Multi-slice modularity to layers

We can repeat again the same analysis we did before on when the communities are well defined. For the different densities we obtain

(1 − µ )(1 − µ SB )hki nc − 1 µµ SB hki = n − nc

p+ in = p+ out

(1 − µ )µ SB hki nc − 1 µ (1 − µ SB )hki = n − nc

p− in = p− out

so that if µ SB < 1/2, we obtain that communities are well defined as long as n − 2nc + 1 . µ< n−1 Surprisingly however, if µ SB > 1/2 the communities are well defined if µ>

n − 2nc + 1 . n−1

This is due to the effect that there are relatively many negative links within a community if µ SB > 1/2. Effectively there is a phase transition at µ SB = 1/2 so that quite suddenly, the regime where the communities are well defined changes. The benchmark results are displayed in Fig. 5.3 for CPM and modular123

Modularity with negative links

Modularity

CPM 1

µSB

5

1

0.8

0.8

0.6

0.6

0.4

0.4

0.2

0.2

0

0

0.2 0.4 0.6 0.8 µ

1 0

0.2 0.4 0.6 0.8 µ

1

Fig. 5.3 Benchmark results with negative links ± ity with negative links. We use the parameters of γ RB = 1 (i.e. modularity) ± ± ± and γCPM = p , where p is the average positive/negative density within a community. The results are reasonably similar, and both work quite well until µ − < 0.5, and as can be expected if becomes increasingly more difficult for higher µ + . For µ − > 0.5 neither CPM nor modularity is able to recover the planted partition correctly. CPM does seem to perform a little bit better for high µ SB and high µ than modularity however.

124

6 I

Applications

this section we will see two applications of community detection. The first focuses on conflict in international relations, and tries to determine the influence of trading communities on the probability of conflict. The second focuses on citation networks and the effect of negative links in networks.

6.1

N

Communities in international relations We will investigate international relations, which have both positive as well as negative components. Negative links are operationalised as conflict, while positive links are represented by alliances (for example a defence pact). When in the early 1990s the Communist bloc fell apart, many wondered what type of world would lie ahead. Two broad scenarios were sketched. On the one hand, democracy was seen as the sole surviving ideology, and conflict was expected to diminish, and Francis Fukuyama proclaimed “the end of history” (Fukuyama, 1992). On the other hand, conflict was no longer fuelled by ideological considerations and Samuel Huntington argued that conflict would simply run across different lines, namely civilizations, in his book entitled The Clash of Civilizations (Huntington, 1996). Clearly it would be interesting to see to what extent communities of international relations would correspond to what scenario. To that end, we analyse international relations taken from the Correlates of War (Ghosn, Palmer and Bremer, 2004; Gibler and Sarkees, 2004) data set over the period 1993–2001, where military alliances can be represented by positive links and conflicts by negative links. The data set contains a wide variety of disputes, for example border tensions between Colombia and Venezuela, the deployment of Chinese submarines to Japanese islands, and Turkish groups entering Iraqi territory. Disputes were as-

6

Applications

signed hostility levels, from “no militarized action” to “interstate war,” and we chose the mean level of hostility between two countries over the given time interval as the weight of their negative link. The alliances we coded one of three values, for (1) entente, (2) non-aggression pact, or (3) defence pact. The disputes wi−j (t) and alliances wi+j (t) are both normalized to values in the interval wi±j (t) ∈ [0, 1] for each year t. They bear equal weight

in the overall link value wi j (t) = wi+j (t) − wi−j (t), and the final weight is

wi j = T1 ∑t wi j (t) with T the total number of years included. For example, if two countries have a defence pact for a single year, the weight wi j = 1/ T, while if they have had war for three years (and no other alliances or conflicts), wi j = −3/ T. The largest connected component consists of 161 nodes (countries) and 2517 links (conflicts and alliances). The result of the analysis using the RB model with configuration null model adapted for negative links is shown in Fig. 6.1. Countries of the same colour belong to the same community, which in this context is perhaps more appropriately labelled a power bloc. The power blocs can be identified as follows: (1) the West; (2) Latin America; (3) Muslim World; (4) Asia; (5) West Africa; and, (6) Central Africa. If we detect communities by using only positive links, there is an agreement of about 64% with the configuration in Fig. 6.1, while if using only negative links, there is an agreement of about 30%, measured using NMI. This resembles quite closely the configuration sketched by Huntington (1996), with a few notable exceptions. The West African power bloc is an additional insight that is absent in Huntington’s configuration. A major difference with Huntington is that China itself does not constitute a separate bloc, nor does Japan or India. Some other noteworthy differences are Pakistan and Iran which are grouped with the West, while South Korea and South Africa are grouped with the Muslim World. + − If we run the algorithm with γRB = 0.1 and γRB = 1, North America merges with Latin America, while Europe becomes an independent community, and North Africa and the Middle East align with Russia and + − China. When setting γRB = 1 and γRB = 2, in contrast, former Soviet countries separate from Russia and form an independent community. Using ± a range of values for γRB , one can detect various levels in the community structure. These results do not imply that conflicts take place between power blocs only, as 24% of all conflicts actually take place within blocs. For example, Georgia and Russia had serious conflicts, and DR Congo and Rwanda 126

Communities in international relations

Fig. 6.1 Communities in the conflict and alliance network

had theirs, but each of these pairs is grouped together nevertheless. In these cases, the alliances overcame the conflicts in the grouping, confirming that a configuration of international relations is more than the sum of bilateral links. In sum, although Huntington’s configuration of civilizations was questioned (Henderson and Tucker, 2001; Russett, Oneal and Cox, 2000), it seems to be fairly robust and with some marked exceptions is confirmed by our analysis. However, this does not imply that this is only influenced by civilizations, since many other underlying factors may play a role. In fact, the more interesting question is how such a structure comes about. Many theories could be relevant, including the democratic peace theory (Hensel, Goertz and Diehl, 2008; De Tocqueville, 2002), which predicts few conflicts between democratic countries but fails to predict that in actuality, most conflicts occur between democratic and non-democratic countries; the realist school (Kissinger, 1994), which emphasizes geopolitical concerns; and, finally, the trade-conflict theory (Polachek, Robst and Chang, 1999), which argues that (strong) trade relations diminish the probability of a dispute, or lower its intensity. We will investigate this in in the remainder of this section, with a particular focus on the effect of trade on conflict. 127

6

Applications

6.1.1 Direct trade and conflict

dyad

Theories about the relationship between trade and conflict have a long tradition in international relations scholarship. Most of these focus on bilateral relationships, explaining whether and how increased levels of trade between two states affect their probability of direct conflict. This focus on only the links involving the two states is known as a dyadic analysis, where a dyad simply refers to the two nodes (states in this case), and the relationship between them. A smaller body of work also examines the ways in which dyadic dependence affects the probability of systemic conflict, although the findings from this work remain tentative (Oneal and Russett, 2011, 2005). Recent work has begun using network analytic measures to demonstrate that indirect trade relations also have important effects on interstate conflict (Maoz, 2006, 2009; Böhmelt, 2009; Dorussen and Ward, 2010). A significant limitation of the existing literature is its almost exclusive focus on direct trading relationships. Analysing only dyadic trade relations over-simplifies the complexity of interdependence and, as a result, loses sight of the ways in which trade reduces conflict even among states that trade very little with each other. We argue that indirect trade dependence creates significant costs of conflict in addition to those created by the levels of direct trade between states. In addition, the conflict-reducing effects of interstate trade are heightened within trading communities. Several studies have provided evidence that indirect trade relations reduce conflict. The probability of conflict is lower among dyads with more trading partners in common (Maoz, 2009; Dorussen and Ward, 2010) and among dyads that are generally more well-connected to other states in the trade network (Dorussen and Ward, 2010). Yet this literature has not fully explained the causal mechanisms underlying these effects. Dorussen and Ward (2010) argue that the key mechanism at work here is informational: trade decreases the likelihood of conflict by facilitating regular interaction, informational exchange and cultural exchange. While acknowledging this important contribution, we argue that indirect trade relations reduce the probability of conflict in two additional ways, which we refer to as the “Combatant Mechanism” and the “Non-combatant Mechanism.” The combatant mechanism That trade between potential combatants may affect their incentives to fight has long been recognized, yet we argue that these incentives may 128

Communities in international relations

also be affected by their trade relationships with other states. We build on the opportunity-cost theory of interdependence. Traditional formulations of this argument focus on the extent to which the potential participants in a conflict stand to have their trade with each other interrupted or otherwise adversely affected (Angell, 1933; Polachek, 1980; Oneal, Oneal, Maoz et al., 1996; Oneal, Russett and Berbaum, 2003). Thus far, the opportunitycost model has focused on the potential effects of conflict between a pair of states on their trade with each other. If a pair of states trades with each other relatively little (or not at all), this theory would predict that trade would have little effect on the probability of war between them. Yet in a world of a complex trade network conflict may also interrupt trade flows other than those between the potential combatants. Although a pair of states may not have a trade relationship with each other, they would jeopardize their trading relationships with other states by going to war, and therefore have a disincentive to do so. Entering a conflict could interrupt a state’s trade with states not involved in the conflict in various ways. Trade relations are highly interdependent, so the terms of trade within any pair of states depend on the terms of trade they have with other states (Anderson, 1979; Anderson and van Wincoop, 2003). A warring state may divert resources previously used to produce certain exports in order to facilitate war-time production, thus reducing or cutting off those export flows. Conflict could result in decreased demand for the state’s exports to the extent that demand is dependent on other trade flows interrupted by the conflict. Conflict may interrupt the supply of imports to the state to the extent it affects the supply chain for those imports. Finally, even when states do not directly trade with each other, indirect trade dependence increases the opportunity cost of a potential conflict between them because the uncertainty associated with war may cause their trading partners to seek other, more stable markets or suppliers (Maoz, 2009; Crescenzi, 2005; Gasiorowski and Polachek, 1982; Polachek, 1980). In summary, the combatants themselves might incur a cost, even though they do not trade directly. The non-combatant mechanism Indirect trade dependence also reduces the likelihood of conflict in a second way that has been under-theorized in the trade-and-conflict literature. Conflict creates costs for states that are not involved in it, but that are dependent on trade relations with the warring states. By interrupting trade flows, conflicts create negative externalities for non-participant states, including by decreasing their access to commerce, increasing the 129

6

Applications

costs of their imports and decreasing the demand for their exports. As a result, indirect trade dependence reduces the probability of conflict by increasing the incentives for third parties to attempt to prevent the conflict (for related arguments, see (Dorussen and Ward, 2008; Böhmelt, 2009, 2010)). While many states do not have the capability to significantly influence the potential combatants, others can and do use their power to deter wars that would damage international commerce (Gilpin, 1981; Krasner, 1999; Kindleberger, 1986). If the non-combatants are too diffuse, diverse or numerous, problems of collective action might preclude an intervention (Olson, 1965). However, if these states are sufficiently interdependent themselves, and not too diverse, they may overcome problems of collective action, and intervene. In summary, even countries not directly involved in the conflict can be affected by the conflict through indirect trade networks, and so have some interest in preventing it. 6.1.2 Trading communities and conflict

maxflow

In which situations are the disruptions to trade caused by conflict most likely to create the types of costs that, in turn, reduce the probability of conflict? In addition, how do we systematically account for the ways in which indirect, networked trade relations affect conflict behaviour? Dorussen and Ward (2010) propose that we can systematically capture the effects of indirect trade links by using the concept of maxflow, particularly because it may be a good proxy for the information flow between the members of a dyad that is facilitated by their trading relations. The maxflow can be defined as follows. Let r and s be two nodes, which play the role of source and sink. We seek to maximize the total flow ∑i f is towards s, where f is is the flow from node i to node s, under the constraint that each flow does not exceed its capacity wi j , and the flow into a node equals the flow from a node ∑ j f i j = ∑ j f ji . In total then the maxflow is defined by max ∑ f is such that i

∑ fi j = ∑ f ji for all i 6= r, s j

j

f i j ≤ wi j . The maxflow is the same as the minimum cut between two nodes, and so equal to the number of independent paths if each link has unit capacity. The maxflow is thus a useful concept for understanding the effects of the 130

Communities in international relations

informational mechanism proposed by Dorussen and Ward (2010). Yet this concept does not capture other ways in which the networked structure of international trade may be relevant to the mechanisms we propose. We illustrate this point using the stylized exchange networks provided in Fig. 6.2 where each edges has unit capacity. In network (a), the maxflow between nodes 1 and 2 is equal to 4 because a connection can be made between 1 and 2 using 4 possible independent routes: 1-3-2, 1-4-2, 1-5-2, and 1-6-2. In network (b), the maxflow between nodes 1 and 2 is also equal to 4. The additional flows in network (b) do not provide additional possible independent paths between 1 and 2. Thus, a theory based on the concept of maxflow would make equivalent predictions regarding the extent to which indirect trade links between 1 and 2 would affect their conflict propensity in the two networks. Yet the two networks vary in terms of density: network (b) is significantly more densely connected than network (a). In terms of trade flows, network (b) can be thought of as more highly interdependent than network (a). 3

4

3 2

1 5

6

(a) Sparse

4 2

1 5

6

(b) Dense

Fig. 6.2 Two trade networks of different densities We argue that this difference between the two groups is crucial. In a highly interdependent group, when individual trade flows are cut off by conflict among the group’s members, the probability that this will adversely affect other flows is higher. Therefore, the costs of a conflict involving two members of such a group would be especially high. Preventing such a conflict may be difficult and costly itself, but the group’s members will have particularly important incentives to overcome this collective action problem. By contrast, when the potential combatants are not embedded within a single group of highly interdependent states, fewer flows may be interrupted by the conflict, and thus the economic costs of the conflict would be significantly lower, everything else equal. This argument points to the concept of communities. Trade creates 131

6

Applications

groups of states at the sub-global level in which the effects of indirect trade dependence are especially significant. Within these trading communities, states have many trading partners in common and, therefore, their dependence on each other is often far greater than their dyadic trade levels would suggest. Some dyads within a trading community trade significantly with each other, such as two developed states that trade differing manufactured goods they specialize in producing. Other dyads within a trading community may trade directly very little, however. This can occur, for example, when two states are at opposite ends of a single supply chain. Another example is of two states that are individually dependent on exporting and importing similar goods to and from the same third country. The key factors that have shaped the structure of the global trading network are also responsible for the formation of trading communities. Trade flows highly unevenly across the international system, which is not at all surprising when taking economic factors into account (Gleditsch, 2003). Geographic distance creates transaction costs that promote trade among close neighbours (Picciolo, Squartini, Ruzzenenti et al., 2012). This suggests that trading communities may have a strong regional component, although this may not always be the case. A state with a highly specialized production capability may be in the same trading community with a distant state that has a complementary demand for that specialized good. More generally, we would not always expect that a group of geographically clustered underdeveloped states would be in the same trading community. We can expect such states to trade relatively little with each other. Thus, if they export to and import from differing markets, they are likely to be in differing trading communities. Africa is a prime example. It would indeed be surprising to find that Africa consists of a cohesive trading community given that most states in the continent are poor and sell many of their raw goods to richer states outside the continent. Historical factors likely also contribute significantly to the formation of trading communities. We would expect, for example, that colonization and decolonization have had significant impacts on the structure of world trade, with former colonies continuing to trade significantly with their former colonizers. More recently, many of the trading relations established within the Soviet Union have continued among the former Soviet states, and thus we would expect a significant likelihood that these states are in the same trading community. These arguments lead to the principal hypothesis that the probability of conflict is lower between state dyads that are members of the same trading community. 132

Communities in international relations

6.1.3 The trade network The first step in testing our hypothesis is to construct the international trade network, which we do by using the data provided by Gleditsch (2002). Constructing this network requires us to assign weights to the dyadic links between states, which we do using the trade flows between them. Specifically, we define these weights using the formula for dyadic trade dependence provided by Oneal and Russett (1997) and used by much of the literature on which we build: wt,i j =

xt,i j + xt, ji , GDPt,i

where xt,i j is the total exports from country i to country j in year t (which equals the total imports to country j from country i), and GDPt,i is the total GDP of country i for year t. We maximized the RB model with the configuration null model to define trading communities at an annual basis over a range of resolutions. Fig. 6.3 shows representative partitions for the year 2000 using resolutions levels that yield 3, 7 and 14 trading communities. At a relatively low resolution level, we observe 3 large trading communities. One community includes the bulk of the Western Hemisphere in what appears to be a UScentric community. In 2000, Argentina significantly devalued its currency, causing short-term changes in its trade relations. In previous years, Argentina was a member of the Western Hemisphere trading community. A few states outside the Americas are also members of this trading community, notably the United Kingdom and Israel, a finding likely driven by their close trade links with the United States. Others, such as Norway, Iceland and Ireland, have less significant trade links with the United States, but do have close links with the United Kingdom, suggesting that they are in this community largely because the United Kingdom is also. The second large community we see at this resolution level includes the former Soviet Union, Eastern Europe and parts of the Middle East. Finally, the rest of the world belongs to a trading community that includes Japan, China, India, much of Europe, South-East Asia and most of Africa. This is arguably the most surprising among the findings at this level of resolution because it includes several major economies that are geographically dispersed. The surprising nature of this result suggests, in fact, that the trading community defined at this resolution level is actually an amalgamation of several sub-communities. 133

6

Applications

As the resolution level increases, so does the number of trading communities defined. Fig. 6.3b shows a partition with 7 communities. The Western Hemisphere community remains largely intact, which is not surprising given the level of dependence of most of these states on U.S. trade, and vice versa. Nonetheless, at this resolution level, the United Kingdom is no longer part of the Western Hemisphere community, and instead belongs to a smaller community consisting of Northern and Central Europe along with several of their African trading partners. We noted above that countries such as Norway, Iceland and Ireland were likely only defined as being in the Western Hemisphere community by virtue of their trade with the United Kingdom, so it is not surprising to observe that they “follow” the United Kingdom into this smaller community. Other states, such as Sweden, Finland and Denmark, are now defined as being in this community despite having previously been defined as part of the larger Russiacentred community rather than the Western Hemisphere community. This suggests that, at the lower resolution level, these countries are borderline cases; indeed, several other partitions at the low resolution level include these in the same community as the United States and United Kingdom. Aside from these states, the community of former Soviet Bloc states remains whole at this resolution level. The only former members of the Soviet Union not in the latter community are the Baltic states, a finding that is not surprising given that these economies have distanced themselves from Russia more so than any others. The largest community found in the low resolution level breaks into several communities at this level. The most notable of these are trading communities that include (1) China and many of its smaller trading partners; (2) South-East Asia, Australia and Japan; and (3) many states bordering the Indian Ocean, including South Asia and East Africa. Finally, at a higher level of resolution, we observe several new trading communities. Three changes relative to the medium resolution are worth noting. First, Northern Europe and Central Europe seem to have split into two communities at high resolution. Second, several states in South America, most notably Brazil, form a sub-community within the larger Western Hemisphere community. Finally, Australia, New Zealand and several of the Pacific Island states have separated from South-East Asia into a smaller trading community that is most likely driven by Australian trade links. A large proportion of global trade is conducted within trading communities. At a low level of resolution, most global trade has been conducted within the trading communities. Interestingly, the percentage of global 134

Communities in international relations

trade conducted within these large communities decreased from about 90% in 1960 to about 55% in 2000, which suggests that globalization may have evened out global trade flows to a significant extent. At the medium level of resolution, about 40% of trade is conducted within trading communities, despite the fact that only approximately 20% of dyads are members of the same trading communities. This result means that a disproportionately large percentage of global trade is conducted within these groups. Finally, at a high level of resolution, approximately 30% of trade is conducted within the 15% of dyads that are joint members of these small subgroups. 6.1.4 Results To test our hypothesis, we first create a variable that indicates whether, in a particular year, both members of a dyad were members of the same trading community (S AME T RADING C OMMUNITY ). As noted in section 2.3, the modularity maximization algorithm may produce slightly different results each time it is run at a given resolution because there are many local maxima at which modularity is optimized. We could certainly choose one that appeared to have high face validity and test our hypothesis using it, but the validity of our results would depend on the validity of that particular partition. Instead, we use a construction that takes advantage of this feature of modularity maximization. For each resolution level, we run the modularity maximization algorithm 100 times. In each partition, we recognize that there is a certain degree of uncertainty regarding whether states have been correctly classified into trading communities. By running the algorithm many times for each dyad-year, we then code S AME T RAD ING C OMMUNITY as “1” if it appears in the same trading community in more than 50% of the partitions and “0” if it does not. Essentially this is a rounded consensus matrix. Control variables As stated earlier, many variables are known to affect the propensity for conflict. We include these variables to show the effect of trade communities goes beyond that. We use Zeev Maoz’s construction of dyadic militarized interstate disputes (M AOZ MID) as the dependent variable (Gochman and Maoz, 1984; Jones, Bremer and Singer, 1996). We coded the variable as “1” for dyad-years in which there was an onset of a militarized interstate dispute in which force was threatened or used, and “0” otherwise . We modified the coding of M AOZ MID such that it indicates whether a MID was initiated in the year following the year in question, which has the same 135

6

Applications

(a) Low resolution (γRB = 0.6)

(b) Medium resolution (γRB = 1.1)

(c) High resolution (γRB = 1.7)

Fig. 6.3 Trading Communities in 2000

136

Communities in international relations

effect as lagging all of the independent variables by one year. Because we argue that S AME T RADING C OMMUNITY should have a negative, significant relationship with M AOZ MID regardless of the level of direct trade dependence, we control for this (D YADIC T RADE D EPENDENCE L OW ) using the same formula in Eq. (6.1.3) used to calculate the weights in the trade network (Oneal and Russett, 1997). We include this control in Model 1 and remove it in Model 2 to demonstrate that our primary result is robust to the inclusion and exclusion of this measure. We also control for the maxflow (M AXFLOW ), to capture some of the indirect effects informational mechanisms may have on conflict propensity. If S AME T RADING C OMMU NITY has a significant relationship with M AOZ MID despite the inclusion of these controls, this would provide evidence that the clustered structure of the trade network has an important relationship with conflict in ways not previously understood. We also include several other controls that may affect the propensity for dyadic conflict and that have been used in much of the trade-and-conflict literature (Oneal and Russett, 1997; Gartzke, 2007; Dorussen and Ward, 2010). Democratic peace theorists argue that democracies have a lower propensity for conflict, especially with each other (Doyle, 1986; Bremer, 1992, 1993; Maoz and Russett, 1992, 2012; Ward and Gleditsch, 1998). We therefore control for the lower (D EMOCRACY L OW ) and higher (D EMOC RACY H IGH ) democracy scores in the dyad using the Polity IV data (Marshall and Jaggers, 2002). Shared membership in inter-governmental organizations (IGOs) may reduce the probability of conflict (Russett, Oneal and Davis, 2003; Dorussen and Ward, 2008), so we control for the number of shared IGOs memberships in the dyad using the Correlates of War 2 International Governmental Organizations Data (Pevehouse, Nordstrom and Warnke, 2004). Economic development may affect conflict propensity, so we follow Gartzke (2007) and others in controlling for the lower of the GDP levels in the dyad-year. We also control for the effects of monadic power on the probability of conflict. The most powerful states are more actively engaged in interstate relations and may therefore be more likely to fight wars. We therefore include a dichotomous variable (M AJOR P OWER ) coded “1” for dyads in which at least one member is one of the five post-World War II major powers (i.e., United States, USSR/Russia, United Kingdom, China, and France). Allied states may be less likely to fight each other, so we include a dichotomous variable (A LLIANCE ) coded “1” for dyads that have concluded an entente, neutrality pact or defence pact based on the Correlates of War (COW) Alliance Data Set (Singer and Small, 1966; Small and 137

6

Applications

Singer, 1969). States may be more likely to attack weaker opponents. We therefore control for the natural logarithm of the ratio of the stronger state’s COW capabilities index (CINC) to that of the weaker state (C APABILITY R ATIO ). We control for several geographic factors known to affect the propensity of dyadic conflict. Including geographic controls allows us to conduct a particularly strict test of the relationship between trading communities and conflict given that we know trading communities are clustered geographically. Wars are generally less costly for states to conduct against their immediate neighbours, so we construct a dichotomous variable coded “1” for dyads that share a land border or that are separated by less than 150 miles of water (C ONTIGUITY ). We also include a control measuring the natural logarithm of the distance between national capitals (D ISTANCE ). We adopt the method of Beck, Katz and Tucker (1998) of including temporal spline variables and a measure of the duration of dyadic peace (P EACEYEARS ) to control for duration dependence. Dyad-years with ongoing MIDs are excluded to avoid address problems of serial correlation. Our analysis includes the years 1960 to 2000. Regression analysis Using this model, we tested our hypothesis over a large range of community detection resolutions. Table 6.1 provides the results of these models for resolutions yielding 3 (Low), 7 (Medium) and 14 (High) trading communities. The results provide substantial support for our hypothesis. States that are members of the same trading community are less likely to experience militarized disputes with each other. Just as importantly, these results are consistent whether or not we take into account the extent to which those states are directly dependent on each other in terms of trade. This means that the pacific effects of trade that result from joint membership in a trading community do not depend on the extent of direct trade dependence, which is the key explanatory variable in extant theories of trade of conflict. In terms of substantive effect, dyads in the same trading community are 48%, 47%, and 59% less likely to experience a militarized dispute in Models 1, 3 and 5, respectively. The control variables generally have the expected relationships with conflict and are consistent with the results of earlier studies (Oneal and Russett, 1997, 2011; Gartzke, 2007). Consistent with Oneal and Russett (1997) and Gartzke (2007), we find that D EMOCRACY L OW is associated with a lower probability of conflict, while D EMOCRACY H IGH is associ138

Communities in international relations

ated with a higher probability. Interestingly, unlike existing studies, we find that dyadic alliance relationships do not have a significant relationship with conflict. Taking only dyadic trade dependence into account, allies are less likely to fight wars, as Oneal and Russett (1997) and Gartzke (2007) found. However, when we also account for indirect trade dependence by including trading community membership in the model, allies are no less likely to fight than non-allies. This result suggests that trading community membership explains conflict behaviour to a sufficient extent as to obscure the effects of direct alliance links. In other words, it may be the case that indirect trade links drive the significant relationship between alliances and conflict found in other studies. In addition to the results reported in Table 6.1, we used a model identical to Model 1 to test our hypothesis over other resolution levels. At all resolution levels between 3 and 15 trading communities, we find that S AME T RADING C OMMUNITY has a significant (p < 0.05), negative relationship with M AOZ MID, which indicates that, within a significant range, our results do not depend on the resolution level we specify. In other words, if we view the world as consisting of 3 very large trading communities, such as those defined in Fig. 6.3a, then joint membership in these communities is associated with a lower probability of conflict. Yet even if we take those communities and divide them into sub-communities, such as those defined in Fig. 6.3c (and even slightly smaller ones), joint membership in these smaller groups continues to be associated with a lower probability of conflict. We also follow Dorussen and Ward (2010) in testing whether our results are consistent when we examine only “politically-relevant dyads”, i.e., those that are either contiguous or include at least one major power. For this sample, we found that S AME T RADING C OMMUNITY has a significant (p < 0.05) and negative relationship with M AOZ MID for the same range of levels of aggregation as reported above (i.e., 3 to 15 trading communities). Our results therefore demonstrate that across a broad range of plausible sizes of trading communities, dyads within these communities have a lower probability of conflict. Nonetheless, we find that joint membership in small groups is not significantly associated with a lower probability of conflict. In such small groups, there may not be sufficient (or any) members with the capacity to pay the costs of preventing a potential conflict. Similarly, we also find that joint membership in too large groups is not significantly associated with a lower probability of conflict. In groups so large and diverse, the group’s members may not be capable of overcoming the 139

6

Applications

collective action problem of preventing the conflict. These results therefore suggest that, while the relative density of trade links is an important predictor of conflict, this factor interacts with group size in ways that merit further investigation.

6.2

Scientific communities and negative links Although negative links are often present in networks, they are not always being discerned explicitly. For example, consider the internet, where web pages are linked through hyperlinks. Of course these links can be negative in its context, for example, “this guy [http://www.someguy.com] is a complete idiot”. More often, insulting language is used in internet fora or in comments on news articles, and are often directed and even personal in nature. Assuming these links to be positive (or rather, ignoring completely they might be signed links) then renders understanding the network quite difficult. Nonetheless, this is a common assumption. This assumption is not limited to online content. Science, for instance, is characterized by cooperation and benign disagreement, but sometimes also by epistemic rivalry. In democratic politics, disagreement with opponents is endemic as it is vital for political identity and to attract voters. Military alliances and conflicts, and economic collaboration and competition are examples already discussed. In social fields in general, people are embedded in a variety of cooperative and conflicting relationships, originating from, or leading to various groups. As a case in point, Shwed and Bearman (2010) recently used the modularity approach to study consensus formation in scientific communities. Not having scientific consensus on certain issues might prevent taking further action. For example, for some time there was a debate about whether smoking was cancerous or not, something considered rigorously proven nowadays. Knowing when there is scientific consensus on some subject and when not, might help understanding the difficulties in reaching scientific consensus. Although some disagreement will always be present in ordinary scientific practice, it should be distinguished from epistemic rivalries, where different paradigms may clash and there is little or no consensus at all. Shwed and Bearman claimed their approach enables them to distinguish consensus and benign criticism on the one hand from epistemic rivalry on the other hand. Their data were scientific journal citations, which they interpreted for their modularity analysis as positive links. On the ba140

Model 1 -0.327** (0.120) -31.816* (15.948) -0.082 (0.395) 0.241*** (0.052) 0.157*** (0.039) -0.004 (0.019) -0.171*** (0.025) 0.010 (0.007) 1.734*** (0.203) -0.659*** (0.089) 1.532*** (0.185) 0.378 (0.222) -0.103** (0.040) -0.387*** (0.044) -3.946*** (0.857) 383126 2586.89***

Low Resolution

-0.128 (0.399) 0.261*** (0.051) 0.145*** (0.039) -0.003 (0.019) -0.173*** (0.026) 0.006 (0.006) 1.685*** (0.205) -0.645*** (0.090) 1.469*** (0.181) 0.313 (0.228) -0.098* (0.040) -0.384*** (0.044) -4.076*** (0.869) 383126 2636.76***

Model 2 -0.336** (0.120) —–

Model 3 -0.299* (0.150) -33.693* (16.674) -0.098 (0.402) 0.257*** (0.053) 0.154*** (0.040) -0.007 (0.018) -0.168*** (0.025) 0.009 (0.007) 1.764*** (0.203) -0.649*** (0.088) 1.505*** (0.185) 0.405 (0.227) -0.105** (0.040) -0.382*** (0.044) -4.253*** (0.823) 383126 2594.20***

Med. Resolution

-0.149 (0.407) 0.277*** (0.052) 0.142*** (0.039) -0.006 (0.019) -0.170*** (0.026) 0.006 (0.006) 1.714*** (0.206) -0.634*** (0.089) 1.440*** (0.182) 0.341 (0.234) -0.101* (0.040) -0.379*** (0.044) -4.399*** (0.837) 383126 2640.70***

Model 4 -0.301* (0.149) —–

Model 5 -0.442* (0.193) -32.566 (16.711) -0.091 (0.406) 0.253*** (0.052) 0.153*** (0.040) -0.006 (0.019) -0.171*** (0.026) 0.009 (0.007) 1.787*** (0.206) -0.645*** (0.087) 1.517*** (0.185) 0.432 (0.228) -0.103* (0.040) -0.381*** (0.044) -4.257*** (0.829) 383126 2626.19***

High Resolution

Robust standard errors in parentheses. * p < 0.05, ** p < 0.01, *** p < 0.001 Resolutions correspond to 3, 7 and 14 trading communities. Estimates for 3 temporal spline variables not reported.

N χ2

Constant

Peaceyears

Capability Ratio (logged)

Alliance

Major Power

Distance (logged)

Contiguity

Shared IGO Memberships

Democracy Low

Democracy High

GDP Low

GDP High

MaxFlow

Dyadic Trade Dependence Low

Variable Same Trading Community

Table 6.1 Logit Models of M AOZ MID S

-0.140 (0.411) 0.273*** (0.051) 0.141*** (0.039) -0.006 (0.019) -0.173*** (0.026) 0.005 (0.006) 1.741*** (0.209) -0.632*** (0.089) 1.454*** (0.182) 0.375 (0.235) -0.098* (0.040) -0.378*** (0.044) -4.383*** (0.843) 383126 2667.13***

Model 6 -0.465* (0.193) —–

Scientific communities and negative links

141

6

Applications

sis of these citation data, they determined scientific communities and their salience, i.e. the extent to which those communities stood out from a random network, as indicated by the raw modularity scores. Let us go over some of the assumptions that Shwed and Bearman made to get their results. Their first assumption is that in “normal science” (Kuhn, 2012), most citations signal agreement. This assumption is entirely plausible (Hanney, Frame, Grant et al., 2005) and there is significant support for it in the literature (Case and Higgins, 2000; White, 2004). Their second assumption is that the comparatively few citations that represent disagreement have no ramifications for the communities detected. We will demonstrate, in contrast, that a small proportion of negative citations can substantially perturb the results. Their third assumption is that epistemic rivalries between communities are marked by a lack of cross-community citations. In other words, contending factions largely ignore each other. They infer from this assumption that if the salience of communities diminishes, consensus increases. However, a lack of citations between groups does not necessarily imply opposing views. On the contrary, they might simply indicate that the communities have different interests, rather than having opposing views. Such groups detected in scientific citation networks are what we would call thematic communities, i.e. groups of scholars specializing in, and writing about the same themes or topics. They are less likely to be positional communities of scholars who agree with community members and disagree with other communities’ views. This is a consequence of scholars citing mostly papers that they consider relevant, regardless of their (dis)agreement with those papers. In the following, we will analyse these issues, and demonstrate that it is nearly impossible to analyse contention and consensus within or between communities when treating all links as positive, opposite to their suggestion. First, we analyse patterns of scientific citations on “smoking is cancerous” and on “solar radiation is cancerous”, the latter being the same data that Shwed and Bearman used. As a baseline, we treat all links as positive, and test whether salient community differences arise when a small randomly chosen portion of the links is coded as negative. Second, we study the evolution of the “smoking is cancerous” field over time, by combining community detection with automated content analysis of the abstracts of the pertaining papers. This shows that these communities are indeed more likely to be thematic communities, i.e. scientific sub-disciplines that focus on different subjects, rather than positional communities that have different views. Third, we analyse a dataset on a public debate in politics 142

Scientific communities and negative links

wherein positive and negative links were distinguished during data coding. We show that the community structure obtained when—incorrectly— assuming all links to be positive is radically different from the community structure obtained when we properly distinguish between positive and negative links. 6.2.1 Effect of negative links Let us now scrutinize Shwed and Bearman’s assumption that the comparatively few citations that represent disagreement have no substantial impact on the communities detected. While some scientific citations are certainly critical, perhaps the proportion of negative references is so low that it is safe to assume that the comparatively few citations that represent disagreement have no impact on the communities found? To see if this is the case we examine two cases: The “solar radiation is cancerous” and the “smoking is cancerous” datasets. We received the “solar radiation is cancerous” data from Uri Shwed, so these citations are exactly the same as they used in their paper. We collected the “smoking is cancerous” dataset from the ISI Web of Science using the same procedure Shwed and Bearman followed. For the latter data we also have the abstracts of most papers, allowing us to analyse to some extent the scientific content of the communities, which we can’t for Shwed and Bearman’s data. To distinguish negative from positive references, we would have to acquaint ourselves with the vernacular of cancer researchers and read thousands of papers, which is beyond feasibility. So, to test the impact of negative links, we therefore set up the following simple procedure. We take a random sample of the links in the corpus, turn them into negative links, and perform community detection on that network. We repeat this procedure a hundred times for each year, and measure each time the difference between the “negatively modified” assignment of nodes into communities and the original assignment, and do this for five percent and ten percent of negative links, respectively. To quantify the similarity of the assignments, we use the measure of Normalized Mutual Information (NMI), as detailed in Section 2.4.2. In order to make sure that the observed differences do not arise because of the heuristic nature of the algorithm, which may lead to somewhat different outcomes in different runs, we perform the same comparison but without changing any of the links into negative. The results are displayed in Fig. 6.4; vertical bars indicate variation and 143



1.0

1.0

Applications

Independent 5% 10%









0.8

0.8

● ● ●











● ●







● ●











NMI













0.6













● ●



NMI

0.6

Independent 5% 10%





0.4



0.2



0.0

0.2

0.4



0.0

6

1980

1985

1990 Year

(a) Smoking

1995

2000

1985

1990

1995

2000

2005

Year

(b) Solar radiation

Fig. 6.4 Difference in communities when making links negative

mean over 100 runs of the NMI score, and the comparison treatment with only positive links is called “independent.” The figure shows that even a low proportion of negative links can cause assignments to differ more strongly than when all links are positive. This is the case both for the “smoking is cancerous” data Fig. 6.4a and for the “solar radiation is cancerous” data Fig. 6.4a. Obviously these differences become larger and more salient when the percentage of negative links increases. Our findings suggest that Shwed and Bearman’s assumption that the comparatively few citations that represent disagreement have no impact on the communities detected is incorrect. We have shown that negative links do have an impact and cannot be ignored if one wants to study contention. We may expect that in actuality, negative links will lead to even more pronounced differences. The reason is that by sampling a certain percentage of the links randomly, we ignored any pattern in the negative links, while we know from both social balance theory and empirical studies (Szell, Lambiotte and Thurner, 2010) that negative links tend to be present in between specific communities, not randomly throughout the network. Those networks with a small percentage of negative links are thus likely to have a more pronounced community structure than we find here. Moreover, such a small percentage of negative links is normally present in science. During periods of epistemic rivalry, when the percentage of negative links is higher, the difference will usually be larger. As said, the actual 144

Scientific communities and negative links

pattern of negative links is unknown to us and remains an empirical question. Nonetheless our analysis shows that a different community structure is likely to be detected when negative links are explicated. 6.2.2 Dissensus or specialization? Now let us focus on Shwed and Bearman’s assumption that epistemic rivalry, i.e. a lack of consensus, is characterized by a lack of cross-community citations. To examine what these communities could represent with respect to a scientific field, we use the “smoking is cancerous” dataset which contains abstracts along with citations. We first extract all words used in all abstracts of the corpus. We assume that a group of articles that uses a shared vocabulary distinct from other groups discusses similar topics or methods. The common technique for extracting terms specific to a (set of) document(s) is the so-called Term Frequency-Inverse Document Frequency (tf-idf). Let w be some word (term), and let nw (d) be the number of occurrences of the word in some document d. Furthermore, let Nw represent the number of documents in which the word w occurs. Then the tf-idf is defined as nw (d) N tf-idf(w, d) = log maxw nw (d) Nw where N is the total number of documents. The underlying principle is that for a certain term to be of specific interest or salience in a document, it should be frequently mentioned in that specific document, and not that much elsewhere (Manning, Raghavan and Schütze, 2008). For the groups (that we first detect through modularity on the citation network), if terms are common in a specific group and rare elsewhere, this indicates that papers in that group concern similar themes or topics. At the group level, we focus on the five most salient terms according to this tf-idf measure. Moreover, by using the multi-slice modularity method (Mucha, Richardson, Macon et al., 2010), we obtain a dynamic view of the evolution of the groups, displayed in Fig. 6.5, together with the five most salient terms for each group. This graphical representation of group dynamics as an alluvial diagram was first used by Rosvall and Bergstrom (2010). To avoid a cluttered image, we only show the twelve largest groups, which over the period of observation have at least 1000 papers. Within a group, it is possible that scholars criticize each other, but we can’t detect contention since we do not know which citations are negative. We can, however, see how the community structure changes over time 145

6

Applications

with respect to common themes or topics. The different communities seem to focus on different research topics. Some communities seem to be researching different types of cancer, such as lung cancer, breast cancer, pancreatic cancer or colon cancer. Other communities seem to be (at least partly) founded on a common research background, such as the p53 tumour suppressor (Cho, Gorina, Jeffrey et al., 1994) and the gstm1 gene. Finally, some communities focus on two products of tobacco (smoke), namely two nitrosamines, nnk and nnal that are associated with risk of cancer. Most of the changes in communities seem to be due to switches and merges between related communities. Overall, they are relatively stable over time, and mostly seem to expand, pointing to an expansion of research, and possible intensification of scientific specialization. This approach makes it possible for us to provide a more substantive description of the evolution of the community structure. Fig. 6.5 provides evidence that the field self-organizes into thematic groups in a process of ongoing scientific specialization, net of possible disagreements within these groups. This is a consequence of scientists citing papers they consider relevant, regardless of possible disagreements. It seems less likely that the groups detected are positional, consisting of scholars who mutually agree while disagreeing with other groups’ views. In absence of information about negative links, not much can be said with any certainty about consensus or dissensus. It is possible that within thematic communities there is disagreement such that, once negative links are explicated, they turn out to be further partitioned into positional communities. 6.2.3 A public debate We now show for data wherein we can distinguish positive and negative links how large the difference between community assignments can be when ignoring this distinction. Our dataset consists of references between authors in the debate about minority integration in the Netherlands. We focus on longer articles published in two broadsheet newspapers (NRC Handelsblad and De Volkskrant) in between the assassination of the populist politician Pim Fortuyn (6 May 2002) and the assassination of film maker Theo van Gogh (2 November 2004). We selected articles from the LexisNexis database through the key word “integration” in conjunction with “foreigners”, “Muslims” or “minorities”. During this turbulent period in Dutch political history there were 149 long (over 1000 words) articles on integration. 146

0

Modularity

1

1977

1978

1979

1980

1981

1982

1983

1985

1986

1987

1988

1989

1990

1991

1992

1993

1994

1995

1996

1997

1998

Fig. 6.5 Communities over time with most frequent terms

1984

1999

nnk, nnal, lung, carcinogen, dna

gastric, colorect, risk, intak, adenoma

pancreat, risk, pancrea, cancer, mutat

exposur, lung, radon, worker, occup

oral, p53, alcohol, patient, risk

lung, exposur, risk, nonsmok, smoker

lung, exposur, radon, betacaroten, worker

p53, mutat, bladder, gene, tumor

hpv, cervic, cin, women, sexual

breast, prostat, women, risk, associ

lung, mortal, smoker, risk, cigarett

adduct, genotyp, dna, gstm1, polymorph

2000

Scientific communities and negative links

147

6

Applications

References to individuals (both Dutch and foreign, dead and alive) as well as to institutions (like political parties) or think tanks were manually coded by Uitermark (2012). In our 149 articles, the references were distinguished according to their tone: positive, neutral or negative. As a rule, positive and negative codes were assigned only if references were unambiguous. References were coded at the level of paragraphs, so it was possible for one article to contain several references to the same author, with each paragraph being coded according to the evaluation implicit or explicit in the reference(s). In total 1779 references by authors commenting on others were coded, either as positive (318), neutral (930), or as negative (531) directed links. Here we include only the positive and the negative links and we consider only the largest component of the network, which has 323 authors. The link weights between two authors were defined by subtracting the number of negative references from the number of positive references. First, we identify communities while assuming that all references are positive. As a result, the network in Fig. 6.6 has a number of relatively dense groups of authors referring to each other. When we distinguish positive and negative links in Fig. 6.7, consistent with the data, it turns out there are in fact two large communities, each with quite different membership than any of the communities from Fig. 6.6. There are many references between these two large communities but they are mostly negative: the two communities clearly disagree, and community membership now corresponds to a large extent to ideological identification. The communities are positional rather than thematic, and contention is a key mechanism of group formation in this field. The large community on the left consists mostly of authors who argue against the stigmatization of Islam and other minorities, while the large community on the right contains a majority of authors who argue that mass migration and (radical) Islam present a threat to Western civilization and to the Netherlands in particular. The NMI score for Fig. 6.6 and 6.7 is 0.34, which is relatively low given that many positively connected authors who were together in Fig. 6.6 stay together in Fig. 6.7. Our key point here is that if one assumes all links to be positive, a very different result is obtained than if negative links are explicated. Once both positive and negative links are taken into account, then it becomes possible to analyse contention. Moreover the number of edges between the two largest communities is quite substantial (mostly negative), contrary to the assumption that there are few citations in between contend148

Scientific communities and negative links

Ahmet Daskapan PPR

Peter Langendam

Harry van Doorn

Frits Bolkestein Commissie van Montfrans

Orhan Pamuk

Bertrand Russell

Hendrik Colijn

James C. Kennedy

Abraham Kuyper

Jorg Haider

Jozias van Aartsen

Theodor Adorno

Hans Janmaat

Vlaams Blok

Elsbeth Etty

Tiny Cox

AEL

Marlite Halbertsma

Herman Vuijsje

Naima Elmaslouhi Dyab Abou Jahjah Mimount Bousakla

Justus Veenman Ali Lazrak

RIAGG Kohnstamm Instituut Van Montfrans Groen Links

SP

Timothy Garton Ash

Kader Abdollah KMAN Fadima Orgu

Meindert Fennema

Karel van het Reve

NRC Handelsblad

Gerard Spong

Malcolm X

Frits van veen

Wim Kok AIVD

Britta Bohler

Mohammed Cheppih Khalifa

VN Committee for elimination of all forms of racism Shukri

Herman Philipse

Paul Rosenmuller

Said Benayad

Bas Heijne

Jan Jacob Slauerhoff Naema Tahir

Tzvetan Todorov

De Volkskrant

Mohammed Sini

Aristoteles

Dick de Ruijter

Paul Schnabel Mansour Khalid Pierre Bourdieu Jefferson

Micha de Winter

Gabriel van den Brink

Piet Hein Donner

Professor Peters

Commissie-Stasi

Haci Karacaer

Mohammed Arkoun Afshin Ellian John Jansen van galen Jos de Beus Claude Lefort John Gray George W. Bush Ibn Hazam

Jacqueline Draaijer Zeki Arslan Jantine Nipius Ria van Gils

Mirjam de Rijk

Silvio Berlusconi Hans Visser Jos de Mul Jerome Heldring Ruud Koopmans Tony Blair Marc de Kessel Avicenna Dietrich Thranhardt Een Ander Joods Geluid Erik Snel Averroes Nazih Ayubi Likud Nederland

Ibn Warraq

David Pryce-Jones

Ayatolah Khomeini Maududi Qotb

Gerard Smink

Ivo Opstelten

Mohammed Benzakour Nieuw Israelitisch Weekblad Al-Qaeda Federatie Nederlandse Zionisten

John Coetzee

Nico de Haas

Leefbaar Rotterdam Rob Oudkerk

Joodse Gemeente Amsterdam Mohammed Reza Pahlavi Joods Journaal CIDI Sjeik Ahmed Yassin Osama Bin Laden

Marco Borsato Osdorp Posse

Sjaak van der Tak

Anita Bocker Abu Nuwas

Ramsey Nasr

Ali B.

Hans Siebers

Ruud Lubbers

Sjoerd de Jong

Jytte Klausen

Duyvendak

FNV Zekeriya Gumus Nico van Nimwegen Ed Leuw

CDA

Martien Kromwijk

Marijke Vos Jean Tillie Kees Vendrik

Anton Zijderveld

Joost Eerdmans

Amitai Etzioni

Daniel Garrison Brinton Hilbrand Nawijn Yucel Yesilgoz Ella Kalsbeek Forum

Maria van der Hoeven

Aad Kosto Marion van San

Hans Boutellier H.J.A. Hofland Thijs Woltgens

Jan Rijpstra

Joost Zwagerman

Arie Slob

Hafid Bouazza

Adri Duivesteijn Karen Adelmund

Irshad Manji

Schelto Patijn

Paul Cliteur Ebru Umar Ernest Renan Sylvain Ephimenco Prinses Maxima Susan Moller Okin Bart Jan Spruyt

Marco Pastors LPF Erica Terpstra

Hoge Commissariaat voor Vluchtelingen Maarten Huygen NCB VVN

imam El-Moumni Michele de Waard Arie van Deursen Stef Blok Ab Klink Maxime Verhagen

Gerard de Vries

SISWO Jan Willem Jan-Peter Balkendende

Dick van Eijk

Soedish Verhoeven Bert Middel Femke Halsema

Willem Vermeend Kees van der Staaij

Jaco Dagevos WRR 2003

Ilhan Akel

VVD Menno Hurenkamp

Pim Fortuyn

Pieter Lakeman

Neal Ascherson

Ad Melkert Jantine Oldersma Annelies Verstand

WRR 2001

Edmund Burke

Nout Wellink

Oscar Hammerstein Paul Gerbrands Rene Cuperus Volkert van der Graaf Johan Norberg Freek de Jonge S.W. Couwenberg Mark Bovens

John Stuart Mill

Dick Cheney

Marcel van Dam Jan Blokker Rudy Kousbroek Hugo Brandt Corstius Bert Wagendorp Renate Rubinstein

Bas van Stokkom

Claude Steele SCP

President Eisenhower Gijs Weenink Jan Schaefer

Els Borst

Hans Dijkstal Jan Brugman

Job Cohen David Brooks Amin Saikal Anne-Ruth Wertheim Jan Pronk Thorbecke

WRR 1989

Immanuel Kant Nazmiye Oral

Bart Tromp Fatima Elatik

Jola Jakson

Arie van der Zwan

Pierre Heijnen

Jan Drentje

Simone van der Burg

Paul de Beer Herbert Gans Henk Doll Ali Madanipour Jacques Wallage

Paul Meurs

Kohnstamm-rapport

Theo Veenkamp Jacqueline Costa-Lascoux

Paul Scheffer

Gerrit Zalm

David Lilienthal

Mohammed Iqbal

Milli Gorus PvdA Jan Beerenhout

Spinoza

Fuad Hussein

WRR

Ahmed Aboutaleb

Ayaan Hirsi Ali

Oscar Garschagen Saddam Hussein

Jelle van der Meer CPB Commissie Blok Geert Mak Senay Ozdemir John Mollenkopf Han Entzinger Michele Tribalat Bernard Lewis Norman Podhoretz Leo Lucassen Betsy Udink Roger van Boxtel Kees van Kooten Wim Willems Jacob Kohnstamm Joost Niemoller Wim de Bie

Profeet Mohammed Erasmus

Wiardi Beckman Stichting Anil Ramdas Fatma Katirci Salman

Aisha

Wasif Shadid

Peter Smit Wouter bos

Rushdie

Edward Said

Ian Buruma

Maurits Berger Werner Schiffauer

Avishai Margalit

Driss el Boujoufi

Samuel Huntington

Theo van Gogh

Frits Wester

Dick Pels

Ronald van Raak

Geert Wilders

Johan Remkes Halim El Madkouri

D66

Camiel Eurlings Nebahat Albayrak

Laurent Chambon Martin Luther Pauline Meurs John Leerdam Fokke Obbema Rita Verdonk Shervin Nekuee

Human Development Report

Tara Singh Varma

Gilles Kepel

Olivier Roy

Fig. 6.6 Thematic communities assuming ties to be positive ing groups. In conclusion, without distinguishing negative links explicitly, little can be said about the contentious community structure, for which further research is necessary. If anything, the data suggest that a key mechanism of group formation is specialization into sub-fields, while it seems less likely that the mechanism of contention, leading to rivalling camps, plays an important role. We showed that incorporating negative links in the analysis can have a substantial impact on the communities detected, even in fields where, as is the case for science, interaction is highly civilized and the proportion of negative references is low. So, in general, researchers have to explicate negative relations (criticism, repel, competition, or violence) when analysing fields wherein conflict is a mechanism of group formation. Only then can communities be detected validly, whatever method of detection is chosen.

149

Applications

6

Rob Oudkerk

Jan Schaefer

Sjaak van der Tak Ivo Opstelten

Jaco Dagevos Menno Hurenkamp Gerard de Vries

Martien Kromwijk

WRR 2003

Jan Willem Duyvendak

Driss el Boujoufi

Ronald van Raak

Arie van Deursen

Kees van der Staaij

SISWO

Dick van Eijk

Justus Veenman

WRR 2001

Edward Said

Aisha

Hans Siebers Kohnstamm-rapport Renate Rubinstein Neal Ascherson Theo Veenkamp Jan Drentje Erica Terpstra Shervin Nekuee Harry van Doorn Hugo Brandt Corstius Human Development ReportBert Middel Jan Blokker Piet Hein Donner Nazmiye Oral Salman Rushdie Martin Luther Mark Bovens David Lilienthal Hans Janmaat Paul Gerbrands Els Borst Jan Rijpstra D66 Amin Saikal Naima Elmaslouhi Anil Ramdas PvdA Jantine Oldersma

Jytte Klausen Theodor David Brooks

Adorno

Fatma Katirci

Forum

Volkert van der Graaf Wiardi Beckman Stichting Anne-Ruth WertheimCommissie Blok

SCP Marijke Vos Job Cohen Rudy Kousbroek Kees Vendrik Ilhan Akel Thijs Woltgens Thorbecke Sjoerd de Jong Marcel van Dam Wim Kok Ruud Lubbers Malcolm X

Hans DijkstalJan Pronk

Ramsey Nasr James C. Kennedy Prinses MaximaJohn Coetzee

Dyab Abou Jahjah

PPR Gerard Smink

John Jansen van galen

AEL Milli Gorus Commissie van Montfrans Kohnstamm Instituut Mirjam de Rijk Betsy Udink Camiel Eurlings

John Stuart Mill

Orhan Pamuk

Stef Blok AIVD Avicenna Nebahat Albayrak Abu Nuwas Susan Moller Okin Een Ander Joods Geluid Han Entzinger Elsbeth Etty Nazih Ayubi Khalifa Jacques Wallage Timothy Garton AshMohammed Benzakour Van Montfrans WRR Ibn Hazam Marlite Halbertsma Hans Visser Dick Pels Paul Rosenmuller Karel van het Reve Averroes RIAGG NRC Handelsblad Bart Tromp Profeet Mohammed Bertrand Russell Oscar Garschagen Professor Peters Mohammed Iqbal imam El-Moumni Groen Links Qotb Fuad Hussein Wasif Shadid S.W. Couwenberg

Roger van Boxtel

Jacob Kohnstamm

Johan Remkes Femke Halsema

Mohammed Sini

CDA Jean Tillie

Claude Steele Bas van Stokkom Meindert Fennema Wouter bos Jozias van Aartsen Adri Duivesteijn

Schelto Patijn

Karen Adelmund

Erasmus

Jan Beerenhout

Spinoza

Hilbrand Nawijn

Ella Kalsbeek

Aad Kosto

Bas Heijne

Pierre Bourdieu

David Pryce-Jones

Fatima Elatik

Nout Wellink LPF

Kees van Kooten Wim de Bie Michele Tribalat Wim Willems Werner Schiffauer Leo Lucassen

Shukri

Ian Buruma Avishai Margalit Maurits Berger

Hans Boutellier Edmund Burke Ebru Umar H.J.A. Hofland

Geert WildersAnton Zijderveld

Gerard Spong

VVDJan-Peter Balkendende

Joost Zwagerman

Hafid BouazzaAmitai Etzioni Britta Bohler Paul Cliteur

Jan Brugman Irshad Manji

Paul Meurs

Ayaan Hirsi Ali

Pim Fortuyn

Nico van Nimwegen

NCB

Maarten Huygen

Ed Leuw

Hoge Commissariaat voor Vluchtelingen

Zekeriya Gumus

Yucel Yesilgoz

Immanuel Kant

Simone van der Burg

Paul de Beer

Jola Jakson

Henk Doll Mohammed Cheppih Dick Cheney Jacqueline Costa-Lascoux John Mollenkopf Leefbaar Rotterdam Soedish Verhoeven Freek de Jonge Kader Abdollah Rita Verdonk Norman Podhoretz Halim El Madkouri Saddam Hussein Osama Bin Laden Ahmet Daskapan Jerome Heldring Pieter Lakeman Marco Pastors Ruud Koopmans Maria van der Hoeven Tiny Cox Hendrik Colijn Senay Ozdemir Johan Norberg Joods Journaal Likud Nederland Arie Slob Silvio Berlusconi John Leerdam Langendam Ab Klink Fadima Orgu Mimount BousaklaPeter VVN Frits van veen Herman Vuijsje Daniel Garrison Brinton Jorg Haider Vlaams Blok Al-Qaeda Frits Wester SP Joodse Gemeente Amsterdam Tara Singh Varma Maududi Maxime Verhagen Sjeik Ahmed Yassin Samuel Huntington Tony Blair FNV Ad Melkert CIDI Federatie Nederlandse Zionisten Oscar Hammerstein Joost Niemoller Abraham Kuyper KMAN Joost Eerdmans

Jacqueline Draaijer Ali Madanipour Nico de Haas Bart Jan Spruyt Peter Smit Paul Scheffer Herbert Gans Ayatolah KhomeiniTheo van Gogh Pierre Heijnen Nieuw Israelitisch Weekblad Rene Cuperus Michele de Waard President Eisenhower Bush Frits BolkesteinAli LazrakGeorge W. Mohammed Reza Pahlavi Gijs WeeninkWillem Vermeend Micha de Winter Jelle van der Meer

Claude Lefort Jantine Nipius

Ephimenco CPB Marion van San Gerrit Zalm Afshin Ellian Ahmed Aboutaleb Geert Mak Bert Wagendorp

Ernest Renan Annelies Verstand Aristoteles Ria van Gils Sylvain

Marco Borsato Ali B.

Osdorp Posse

Dick de Ruijter

Said Benayad

Tzvetan Todorov

De Volkskrant Gabriel van den Brink

Jos de Mul

Marc de Kessel

John Gray

Commissie-Stasi Mansour Khalid Paul Schnabel VN Committee for elimination of all forms of racism Herman Philipse

Bernard Lewis Ibn Warraq

Jefferson

Fig. 6.7 Positional communities assuming ties to be negative

Jos de Beus

Laurent Chambon

Fokke Obbema

Pauline Meurs

Olivier Roy Gilles Kepel

Haci Karacaer

Naema Tahir Jan Jacob Slauerhoff

Mohammed Arkoun

Zeki Arslan

Arie van der Zwan

WRR 1989

Erik Snel

Dietrich Thranhardt

Anita Bocker

150

PART II Social Balance & Reputation

7

Social balance

N

EGATIVE links play a prominent role in many social scientific fields, although most research has almost exclusively focused on positive links. Ranging from stereotype formation (Wert and Salovey, 2004; Greenwald, Banaji, Rudman et al., 2002), norm maintenance (Friedkin, 2001) to social conflicts (Labianca, Brass and Gray, 1998) and armed conflicts (Maoz, 2006), in all situations negative links play a pivotal, if not primal, role. Often they constitute the first organizing principle in such networks, and sometimes the opposition between two contending groups is even stronger then their internal cohesion. However, how and why negative links form exactly is not completely clear. In this chapter we will investigate the structure of negative (and positive) links, and in the next chapter focus on their dynamics.

Although seemingly unrelated, negative links also play a natural role in the evolution of cooperation. We assume that if a link is negative, people do not cooperate, while if it is positive they do cooperate. Not everybody necessarily cooperates with everybody, and it is in fact often advantageous not to cooperate. At the same time, we do see a lot of cooperation in nature. This has long baffled social scientists and biologists alike, and remains an elusive problem. We will analyse the structure and dynamics of negative links in the context of the evolution of cooperation in Chapter 9. But first we will turn to the concept of social balance (Harary, 1953; Cartwright and Harary, 1956; Davis, 1967; Cartwright and Harary, 1968, 1979), which we already briefly saw while discussing negative links in community detection. We will discuss it in somewhat more detail than before. Social balance can be seen as the first organizing principle of networks with negative links. The basic idea is that triads (cycles of length 3) should be balanced: friends should think alike about a third person, while enemies should disagree. We will see that if all triads are balanced, a complete network can be split into two factions.

7 cognitive dissonance

Social balance

The idea of social balance is often motivated from a theory known as cognitive dissonance, which is a theory in psychology that dictates that different beliefs and actions should be in accord with each other (Festinger, 1957). That is, if you think that saving wildlife is an important issue, yet you condone elephant hunting, this creates some friction, some dissonance. Of course, not all beliefs should be in perfect accord with each other, and some contradictory beliefs create more dissonance, while other create less dissonance. The first step it to extend this idea to another person. Consider that you have some friend (or at least have that belief). Suppose that person, that friend, has very different ideas than you. It is then argued that this would induce some cognitive dissonance as well. After all, why should you be friends with somebody who is completely different from you? So, in order to reduce the amount of dissonance, two things can happen: either the friendship declines or beliefs of the two friends converge. So, in general we should expect most friends to think alike (at least to some extent). The second step is now to consider a third person. If two friends are expected to think alike, the same should hold for their opinion concerning a third party. In particular, if somebody likes a third person, his friend is expected to also like that person, and similarly so if somebody dislikes that third person. A similar reasoning holds for two enemies. If somebody likes a third person, their enemy is expected to dislike that person. We can thus discern between two types of triads: balanced ones and unbalanced ones, as illustrated in Fig. 7.1. Balanced triads are consistent and do not induce any stress in terms of dissonant beliefs or behaviour. Of course, if somebody is hated by a lot of people this will surely induce stress, but it will not be cognitively dissonant. In fact, you might wonder how somebody who is disliked that much thinks about himself, and indeed such a situation also often induces a negative self-esteem, congruent with cognitive dissonance theory (Bearman and Moody, 2004; Labianca and Brass, 2006; Labianca, Brass and Gray, 1998; Lakey, Tardiff and Drew, 1994). Unbalanced triads are believed to induce some stress due to cognitive dissonance, thereby creating an incentive for changing the unbalanced triad. For example, if Alice and Bob are good friends and Bob likes Eve, but Alice doesn’t like her, this creates some tension. So, we might expect either Bob to change his relationship to either Eve or Alice, or expect Eve and Alice to become friends. In everyday life such situations might pop-up for example when a couple breaks up: people may have befriended both 154

Balanced triads

partners, but when the partners break up, their positive link is flipped to a negative link, thereby creating an unbalanced triad. This unbalanced situations is then often resolved by only staying friends with one of the two partners, or “choosing sides” so to speak. Although the motivation comes from cognitive dissonance theory, the theory of social balance has been formalized to quite some extent without reference to cognitive dissonance. The focus is in first instance on triads and complete graphs that can be split into (at most) two factions. Similar definitions can also be provided on sparse graphs, and some weaker definition can be given such that a graph can be split into more factions.

7.1

Balanced triads The notion of social balance can be formalized by looking at triads (cycles of length 3) (Harary, 1953). In general, we define a signed graph as G = (V, E− , E+ ) where E− ⊆ V × V are the negative links and E+ ⊆ V × V the positive links and E− ∩ E+ = ∅, so that no link is both positive and negative. Furthermore, we will restrict ourselves to undirected graphs. In this case, the definition of undirected is not immediately straightforward, but in this case we mean that if there is an edge (i, j) ∈ E+ ∪ E− then also ( j, i) ∈ E+ ∪ E− . So, the signs may in principle be different, but if there is a link in one direction, there must also be a link in the opposite direction. The adjacency matrices A+ and A− are then defined accordingly, so that Ai+j = 1 whenever (i, j) ∈ E+ and zero otherwise, and similarly Ai−j = 1 if (i, j) ∈ E− and zero otherwise. The signed adjacency matrix will be denoted by A˜ = A+ − A− . In this section we will work exclusively with the signed adjacency matrix, so that we will use A = A˜ in order to avoid cluttering of the notation. Hence, A˜ = A can be also defined as  −   −1 if (i, j) ∈ E , Ai j =

1   0

if (i, j) ∈ E+ ,

(7.1)

otherwise.

Notice that in principle this matrix need not be symmetric, although it will follow that for socially balanced networks it is (and so undirected and sign symmetric is the same for socially balanced graphs). Nonetheless, because the network is undirected, we do have that | A| = | A> |. Social balanced graphs are then also sign symmetric so that we obtain A = A> . This can 155

signed graph E±

7

Social balance

social balance

be relatively straightforwardly extended to weighted graphs, but for those we are still foremost concerned with their sign, which then simply reduces to the case under consideration. In this subsection we will first concentrate on complete graphs (including self-loops), such that there is an edge for all pairs of nodes. That is E+ ∪ E− = V × V and | Ai j | = 1 for all i, j. We will define a balanced triad as a cycle of three nodes, for which the product of the signs of the edges are positive.

triad

Definition 7.1. A triad i, j, k is called (socially) balanced whenever

Ai j A jk Aki = 1.

(7.2)

A complete signed graph G is (socially) balanced whenever all triads are balanced. We will sometimes also state that some real matrix X is socially balanced, which is taken to mean formally that sgn( X ) is socially balanced. Let us first prove that balanced complete networks are symmetric. Lemma 7.2. A socially balanced complete network is sign symmetric.

Proof. First observe that the triad Aii Aii Aii = 1 is balanced, so that Aii = 1. Then also Aii Aik Aki = Aik Aki = 1 by social balance, so that Aik = Aki . Notice that the self-loop Aii is pivotal here. This could be interpreted as self-esteem (what does i think of i?), and is always positive in a balanced network. If self-loops are not included, the signs might be of opposing sign if we only consider triads. However, in the next subsection we will see that the more general definition will preclude this case. If a complete network is socially balanced, we can split such a graph in (at most) two factions, such that the links between the two factions are negative and the links within a faction are positive. faction

Definition 7.3. Let G = (V, E+ , E− ) be a signed graph, then a faction F ⊂ V is a

subset of nodes such that

(u, v) ∈ / E− for u, v ∈ F,

(u, v) ∈ / E+ for u ∈ F, v ∈ V \ F. A partition into factions is then a set of of factions F = { F1 , F2 , . . . , Fq } Sq such that V = i=1 Fi and Fi ∪ Fj = ∅ for i 6= j, similar to the partition into 156

Balanced triads

Two Factions

Balanced

Unbalanced Fig. 7.1 Balanced triads in complete network communities (see p. 23). Notice that a partition into factions corresponds to a block partition of a matrix (up to reordering) as  + − ··· − − + · · · −   A=. .  .. · · · . . . ..  − ··· − + 

where + denotes a block of only non-negative entries (i.e. 0 or 1) and − denotes a block of non-positive entries (i.e. 0 or −1). For a socially balanced signed graph, this partition is limited to at most two factions (this restriction is not present for weak social balance, see section 7.3). This condition can also be expressed in terms of the spectrum. This idea is illustrated in Fig. 7.1. Theorem 7.4. Let G = (V, E+ E,− ) be a complete signed graph with symmetric

adjacency matrix A. Then the following are equivalent: 1. G is socially balanced, 2. G can be split in at most two factions, 3. A = uu> where |ui | = 1.

4. λ1 ( A) = n, λi ( A) = 0 for i ≥ 2.

Proof. Let us first prove that (1) ⇒ (2). Let us take a node v ∈ V, and set F1 = v ∪ N + (v) where N + (v) = {u|(u, v) ∈ E+ } are the positive neighbours of v, and set F2 = V \ F1 . Suppose (u, v) ∈ E− . Then if u and v are in 157

7

Social balance

the same component they have a common positive neighbour w, and hence the triangle uvw has negative sign, contradicting social balance. Hence all negative links are between F1 and F2 and all positive links within F1 and F2 . Indeed, this corresponds to two factions (one which might be empty). Now let us prove (2) ⇒ (3). Notice that up to relabelling the split in at most two factions corresponds to  A=

+ − − +



  + = (+ | −) . −

(7.3)

where each + and − corresponds to a block of only 1 and −1 respectively. So with u = (+ | −) this gives the requested property. Then (3) ⇒ (4) is almost immediate. Since A = uu> we obtain that Au = uu> u = un so that λ1 ( A) = n. Since A is a rank one matrix λi ( A) = 0 for i ≥ 2. Finally, let us prove (4) ⇒ (1). Since A is a rank one matrix we can write A = uu> for some u, so that Ai j = ui u j and ui2 = 1. Then Ai j A jk Aki = ui u j u j uk uk ui = 1. Notice that if A = uu> then A2 = nuu> so that all powers of A are also socially balanced (or strictly speaking sgn( A2 ) is balanced). This theorem completely describes socially balanced complete signed graphs, and their structure is very simple. Notice that the eigenvalue decomposition of A = uu> corresponds exactly to the minimization of the frustration provided in section 5.1.1 on p. 116.

7.2

Balanced cycles If we analyse signed graphs that are not complete, the definition of balanced triads is no longer satisfactory. After all, if a link is missing, such that Ai j = 0, is that triad involving the link (i j) then not balanced? Suppose we say we only take into account triads which are complete (all three links are present). Then there are plenty examples of signed graphs such that each triad is balanced, but that it no longer neatly splits into two factions. So, for general signed graphs a somewhat different definition of social balance is appropriate (Harary, 1953). However, it is consistent with the case of complete signed graphs in the previous section, and it emerges as a special case. The focus in this case is on cycles, and we can define a balanced cycle as follows. 158

Balanced cycles

Definition 7.5. Let G = (V, E+ , E− ) be a signed graph and A the signed ad-

jacency matrix. Let C = v1 v2 . . . vk v1 be a cycle consisting of nodes vi with vk+1 = v1 . Then the cycle C is called balanced whenever

sign of cycle

k

sgn(C ) :=

∏ Avi vi+1 = 1.

(7.4)

i =1

A signed graph G is called balanced if all its cycles C are balanced. We will also call balanced cycles positive cycles, and unbalanced cycles negative cycles. Furthermore, we can define the sign of a path. Definition 7.6. Let P = v1 v2 . . . vk be a path in a signed graph G with signed

adjacency matrix A. The sign of the path P is then defined as sgn( P) :=

k−1

∏ A vi vi +1 .

sign of path

(7.5)

i =1

We then speak of a positive or negative path. Clearly a positive cycle consists of two paths of the same sign. The interpretation of balanced cycles remains similar as before. Consider for example a cycle of length 4 with a single negative link between node u and v. Then on the one hand there is a complete positive path between u and v (of length 3), while on the other hand there is a negative link between u and v. If we extend the previous idea that a friend of a friend is a friend to the third degree, u and v should be friends, not enemies. Hence, such a cycle should be unbalanced, and indeed its sign is −1. Now consider again a cycle of length 4 between u and v but now with one path consisting of two positive links and the other one of two negative links. Then u is the friend of a friend on the one hand, while it is the enemy of an enemy on the other hand. This is consistent with each other, and so the cycle is balanced. It is immediately clear that a balanced undirected network should be sign-symmetric, since also the cycles of length 2 must be positive. Moreover, if there are any self-loops they need to be positive (them being cycles of length 1), similar to the previous section. Lemma 7.7. A balanced signed graph G is sign symmetric A = A> and any self-

loop is positive. From here onwards a socially balanced network is hence sign symmetric. Notice that this is consistent with the triads on a complete graph, but 159

7

Social balance

v2

v1

vk

vr −1

vr

vr +1

Fig. 7.2

chord

Cycle with chord

that we now also look to cycles of a different length. Notice there can be many cycles (particularly for complete graphs). However, it is possible to prove that if all chordless cycles (of size at least 3) are balanced, then all cycles are balanced. A chord is an edge between two vertices of a cycle, see also Fig. 7.2. Lemma 7.8. Let C = v1 v2 . . . vk v1 be a cycle with a chord between nodes v1

and vr in C (which by the previous lemma is sign symmetric). Then let C1 = v1 v2 . . . vr v1 and C2 = v1 vk−1 . . . vr v1 be the induced subcycles. Then C is balanced if C1 and C2 are balanced Proof. See Fig. 7.2 for an illustration. Let s1 = sgn(C1 ) and s2 = sgn(C2 ) be the sign of the cycles C1 and C2 . By assumption we have that s1 = s2 = 1, since they are balanced. Then the path from v1 to vr in C1 and the path from v1 to vr in C2 must both have the same sign, since both cycle share the common edge (v1 , vr ). Since the signs of both paths from v1 to vr are the same, the cycle C must have positive sign. The inverse is not true however. A cycle may contain subcycles of negative sign. However, clearly, if all chordless cycles (of size at least 3) have positive sign, all cycles have positive sign, and so the network is balanced. Moreover, if a network is complete, the only chordless cycles are triads. Hence, a complete network is socially balanced if and only if all triads are balanced, so that indeed this more general definition is consistent with our discussion in the previous section. Using this definition, we can prove that a balanced signed graph can be split into (at most) two factions. However, the eigenvalues and eigenvector might be more complicated because of the zeros in the signed adjacency 160

Balanced cycles

matrix. Nonetheless, the largest eigenvector provides the information on the two factions (as was also shown in section 5.1.1 on p. 116). Theorem 7.9. Let G = (V, E+ , E− ) be a connected signed graph and A the signed

adjacency matrix. Then G is balanced if and only if G can be split into (at most) two factions. Proof. First assume G is balanced. Then pick a random v ∈ V and set F1 = {u|sgn(u − v path) = 1}, i.e. all the nodes that can be reached through a positive path. Define F2 = V \ F1 . Let e = (u, w) ∈ E− . By construction E− ( F1 ) = ∅ since it would otherwise contradict balance. Suppose now that e ∈ E− ( F2 ). Both the u − v path and the w − v path is negative (otherwise u and w would be in F1 ). There is then a u − w path that is positive (the product of the two negative paths is positive), and (u, w) ∈ E− so that there is a negative cycle, which contradicts balance. Hence, all negative edges lie between F1 and F2 so that any positive edges lie within F1 and F2 , corresponding to two factions (one of which may be empty). Vice-versa, suppose G can be decomposed into two factions F1 and F2 . Let C be a cycle. If C is contained within F1 or F2 it is completely positive, so that sgn(C ) = 1. So, suppose C has some node u ∈ F1 and v ∈ F2 . Then by definition of factions, both u − v paths are negative, and so the cycle C is positive. Hence, all cycles are balanced, and so G is balanced.

Whether social balance holds can be easily seen from the dominant eigenvector.

Theorem 7.10. Let G be a connected signed graph and let u be the dominant

eigenvector of the signed adjacency matrix A. Then G is balanced if and only if F1 = {i ∈ V |ui > 0} and F2 = V \ F1 defines the split into two partitions. Proof. If the split defines correct factions, then obviously G is balanced by the previous theorem. The other way around, suppose G is balanced. Then A = A T . Let u be the dominant eigenvector. Suppose that ui Ai j u j < 0 for some i, j. Then let x be another vector with | xi | = |ui | for all i and xi Ai j x j > 161

7

Social balance

0 for all i, j, which is possible by social balance of G. Then k xk = kuk and u> Au =

∑ ui Ai j u j

(7.6)

< ∑ | ui Ai j u j |

(7.7)

= ∑ | xi Ai j x j |

(7.8)

= ∑ xi Ai j x j = x> Ax,

(7.9)

ij

ij

ij

ij

which contradicts the fact that u is the dominant eigenvector. Hence, we obtain that ui Ai j u j ≥ 0 for all i, j and it defines a correct partition. Furthermore, if a signed adjacency matrix A is socially balanced, then so is A2 (and by extension Ak for any k). Theorem 7.11. Let A be a balanced signed adjacency matrix. Then A2 is balanced.

Proof. Let A be balanced. Suppose that i and j are in the same faction. Then all paths between i and j are positive, so that in particular ∑k Aik Ak j ≥ 0. Now suppose that i and j are in a different faction, then all paths between i and j are negative, so that ∑k Aik Ak j ≤ 0. Hence, A2 is also balanced. Notice that the inverse does not hold, since the number of balanced cycles may outweigh the number of unbalanced cycles, so that A2 might be balanced, while A is not. Consider for example a graph with the following sign structure   − + A= . + − Then A2 is indeed balanced, while A is not. Finally, it is obvious that any subgraph of a balanced graph is balanced itself.

7.3

Weak social balance In the previous sections, any cycle with an odd number of negative links is called unbalanced. However, if you consider to split such a cycle into factions, there is not necessarily a problem. Consider for example the simplest case, a triad with three negative links. Although this triad is clearly not balanced (the cycle is negative), it can be easily split into three factions: each 162

Weak social balance

node constitutes its own faction. This is obviously a correct partitioning: there are only negative links between factions and positive links within factions (none in this case). Is it possible to characterize networks that can be split into factions in a simple way? The answer is yes, and cycles are still key (Cartwright and Harary, 1968; Davis, 1967). Consider as an example a cycle with a single negative link between node u and v. On the one hand node u and v should be clustered in the same faction since they are joined by an all positive path. On the other hand, node u and v should be clustered in a different faction, since they are joined by a negative path. This simple condition is in fact sufficient to characterize “clusterable” signed graphs. Definition 7.12. A cycle C = v1 v2 . . . vk v1 is termed weakly balanced if it con-

tains not exactly a single negative link. A signed graph G is called weakly balanced if all its cycles C are weakly balanced. We will also refer to the social balance defined previously as “strongly balanced”. Any graph that is strongly balanced is then obviously also weakly balanced. A cycle that contains an even number of edges (has a positive sign) surely won’t have exactly a single negative link. The inverse is not true however, the triad with three negative link being a prime counter example. This explains also why the two different definition might be called strongly and weakly balanced: strong balance is more constrained and implies weak balance, but not vice-versa. Notice that weakly balanced graphs must also be sign-symmetric (the cycle of length 2 must not have exactly one negative link). Similar as before, we can focus on chordless cycles. Lemma 7.13. Let C = v1 v2 . . . vk v1 be a cycle with a chord between nodes v1 and

vr in C. Then let C1 = v1 v2 . . . vr v1 and C2 = v1 vk−1 . . . vr v1 be the induced subcycles. Then C is weakly balanced if C1 and C2 are weakly balanced. Proof. Both C1 and C2 do not contain a single negative link. Suppose that the link v1 vr is not a negative link, then the only negative links of C1 and C2 also appear in C so that C is weakly balanced. Suppose that v1 vr is a negative link. Then both C1 and C2 should contain at least one negative link that also appears in C so that C again is weakly balanced. The inverse is not true, which can be readily seen by considering an allpositive cycle with a single negative chord. The all-positive cycle clearly is weakly balanced, but the induced subcycles are not. 163

weak social balance

7

Social balance

Theorem 7.14. Let G be a signed graph. Then G is weakly balanced if and only if

it can be split into factions F = { F1 , F2 , . . . , Fq }.

connected components

Proof. Suppose G is weakly balanced. Let G + = (V, E+ ) be the positive part of the signed graph, and let the factions be defined by the connected components of G + . Suppose that (u, v) ∈ E− . Then u and v are never in the same positive component since there would then be an all positive path between u and v, contradicting weak balance. Hence, this corresponds to a correct split into factions. Vice versa, suppose G is split into factions. Then any cycle clearly cannot contain exactly a single negative link, since there would then be a negative link within a faction, contradicting its definition. Hence G is weakly balanced. For a complete signed graph, the condition for it to be split into factions is even simpler. Corollary 7.15. Let G be a complete signed graph. Then G can be split into factions if and only if the triad composed of a single negative link is not present.

Proof. By lemma 7.13 we can look only to triads, and by the previous theorem these triads should not contain a single negative link. So, for a complete signed graph, there is only a single forbidden triangle for it to be weakly balanced: the triad with a single negative link. If in addition the triad with three negative links is a forbidden subgraph, it is strongly balanced. The characterization of a signed graph that can be partitioned into factions is rather simple: the forbidden subgraphs are cycles with a single negative link. On the contrary, determining the minimum number of factions necessary is less trivial. To see this, let us constructs a contracted graph G ∗ = (V, E) as follows. For every positive connected component (i.e. the components of G + ) we define a node v ∈ V ( G ∗ ). Whenever there is a negative link between two connected components in G represented by two nodes u, v ∈ V ( G ∗ ) we create a link (u, v) ∈ E( G ∗ ). Obviously, the graph G is weakly balanced, if and only there is no self-loop in G ∗ , corresponding to a cycle with a single negative link. After all, such a self-loop would imply that two nodes in a positive component would have a negative link, so that there must be a cycle with a single negative link. Definition 7.16. Let G be a weakly balanced signed graph, so that it can be parti-

tioned into factions F = { F1 , . . . , Fq }. We denote by χ( G ) the minimum number 164

Weak social balance

of factions q = |F | necessary to partition the signed graph G into factions, and by Ω( G ) the maximum number of factions, or χ( G ) = min |F |

Ω( G ) = max |F | The correspondence with the chromatic number χ( G ) (the minimum number of colours necessary to colour a graph) is intentional, and there is a natural correspondence between the two. The upper bound Ω( G ) is easily determined, and is provided by the number of nodes in G ∗ , i.e. by the number of positive components of G. Although for G ∗ this is the same as usual for any valid colouring, but for G the maximal number of colours is more restricted than usual in a colouring. The lower bound χ( G ) can also be simply expressed by G ∗ and we have that χ( G ) = χ( G ∗ ). So, the minimum number of factions necessary to partition a balanced signed graph G is equal to the chromatic number of the contracted graph G ∗ . The correspondence between a colouring problem and the partition into factions is not exact however. A graph can always be coloured, and always possesses a correct colouring. A signed graph however can not always be coloured, that is, partitioned into factions, since only weakly balanced graphs can be correctly partitioned. Although the problem of determining the minimum number of factions reduces to determining the chromatic number χ( G ∗ ) of the contracted graph G ∗ , this is still not easily determined or characterized. Two well known bounds exist and ω( G ∗ ) ≤ χ( G ∗ ) ≤ ∆( G ∗ ) + 1 where ω( G ∗ ) is the largest clique in G ∗ and ∆( G ∗ ) the maximum degree. In general, it is NP-hard to determine χ( G ∗ ), and no simple characterization is known to exist. An easy case however is determining if χ( G ∗ ) = 2 in which case G ∗ is simple bipartite. There is a simple characterization of bipartite graphs, namely that they do not possess any odd-length cycles. This corresponds exactly to not having cycles of negative sign in the signed graph G (an odd number of negative links), and so corresponds to strong balance. For a strongly balanced signed adjacency matrix A, we know that A2 is also balanced. This is mainly due to the fact that products of any cycles are positive, so that any paths have signs consistent with social balance. For weak balance this no longer holds. For sparse graphs this is immediately clear, since not all links need to change in the same way when taking A2 . Even for full graphs this does not hold however, which might not be 165

chromatic number

clique ∆ maximum degree

bipartite

7

Social balance

readily clear. As a small counter example, consider three factions of size ni , n j and nk (there might be other factions still) in a weakly balanced complete graph of size n. Then A2 will have negative links between factions i and j yet have positive links between factions i and k and j and k, and so will no longer be socially balanced (neither weakly nor strongly), under the following conditions: n , 2 n ni + n k < , 2 n n j + nk < . 2 ni + n j >

In terms of common enemies, these inequalities are quite intuitive. It implies that both factions i and k and factions j and k have relatively many common enemies (i.e. ni + nk < n/2 and n j + nk < n/2), yet factions i and j don’t have that many common enemies (i.e. ni + n j > n/2). This results in an A2 with (ik) and ( jk) being positive links, whereas (i j) is a negative link. By corollary 7.15 it is not weakly balanced (nor is it strongly balanced). Summarizing, we have the following. Strongly balanced graphs • have cycles of positive sign, and • can be split into (at most) two factions, whereas weakly balanced graphs, • have cycles with not exactly one negative link, and • can be split into factions. Furthermore, social balance implies weak balance, but not vice-versa.

166

8 T

Models of social balance

are two big questions associated with social balance. The first is how to detect whether a network can be split into factions. We already addressed this in chapter 5. The second question concerns the emergence (and stability) of social balance. If indeed social balance should emerge from some process such as cognitive dissonance, can we model such a process and show that social balance results? In other words, what model can potentially lead to social balance? And under what conditions will it lead to social balance? In this chapter we will address these questions. We will restrict ourselves to complete graphs and strong social balance. Of course, it would be very interesting to study models on sparse graphs and relate them to weak social balance. There do seem to be possibilities for addressing both issues in the modelling, yet the analysis becomes much more difficult, and is reserved for future work.

8.1

HERE

Discrete models One of the first suggested models for social balance was discrete in nature (Antal, Krapivsky and Redner, 2005). All links simply have a sign + or − (or +1 and −1), and the signs can only flip from positive to negative, or the other way around. Starting from some initial condition, the idea is then that if we flip edges long enough social balance may emerge. Of course, if we simply randomly flip links, this is unlikely to happen. So, these flips should follow some rules, which should obviously be related to social balance. As stated, we will limit ourselves to complete graphs (without selfloops), so that we can focus on triads only. We will also assume that the graphs are undirected and sign symmetric, so that there are simply two balanced triads (those with 0 or 2 negative links), and two unbalanced triads

8

Models of social balance

(those with 1 or 3 negative links). Indeed, by lemma 7.8 we should only concern ourselves with triads, and it is not necessary to focus on other cycles. This makes it significantly easier to analyse models for complete graphs than for general graphs. Moreover, we will only analyse the meanfield behaviour, which was shown to accurately predict simulated results (Antal, Krapivsky and Redner, 2005). Now the model goes as follows. We randomly choose a triad and if the triad is unbalanced, we will change one of its links so that is becomes balanced. However, it might be that some other triads then become unbalanced. So it is not immediately clear whether such a process will lead to social balance. There are then two choices available: we simple change one of the links randomly without concern for the other triads, known as Local Triad Dynamics (LTD), and one in which we only update if it improves the overall number of balanced triads, known as Constrained Triad Dynamics (CTD). 8.1.1 Local triad dynamics Local Triad Dynamics

Let us first detail the Local Triad Dynamics (LTD) model. Let us denote by 4k a triad with k negative links, so that 40 and 42 are balanced, and 41 and 43 are unbalanced. Whenever we choose a random triad, which is unbalanced, we flip one of its links, such that with probability p a triad changes from 41 → 40 , and with probability 1 − p a triad changes from 41 → 42 . Obviously, with a single flip a triad 43 can only change to 42 , since it has 3 negative links. We will first analyse how this model behaves in the limit of large n number of nodes. Let us denote by T = (n3 ) the number of triads in a network, and by Tk the number of triads with k negative links, and define the proportion of triads with k negative links tk = TK / T. Furthermore, denote by m+ and m− the number of positive and negative links. Then obviously, m+ =

1 n−2

∑(3 − k)Tk k

m− =

1 n−2

∑ kTk , k

since each 4k triad contains k negative links, and each link appears in n − 2 triads. The density of positive links is then ρ = m+ /m = ∑k (3 − k)tk /3, and obviously the density of negative links is 1 − ρ = m− /m = ∑k ktk /3. Finally, let us write by Tk+ the average number of positive links that are attached to a 4k triad, which can be written as Tk+ = (3 − k) Tk /m+ , because each 4k triad has 3 − k positive links, and there are m+ positive 168

Discrete models

links in total. The probability that a positive link is attached to a 4k triad is then Tk+ (3 − k )tk t+ . k = N−2 = ∑l (3 − l )ltl Similarly we can define Tk− as the average number of positive links attached to a 4k triad, which is Tk− = kTk /m− and t− k =

Tk− ktk = N−2 ∑l ltl

denotes again the probability a negative link is attached to a triad with k triads. Suppose we have chosen an unbalanced triad 41 with a single negative link at random. The probability of selecting such a triad is t1 . The probability that a negative link changes to a positive one is p, since 41 → 40 with probability p, while the probability that a positive link changes to a negative one is 1 − p. Suppose that 41 → 40 and that a negative link switched sign. The probability that a negative link is attached to a 4k triad is t− k and these triads also change. So, in this case, the proportion of triads of type 41 changes as − t01 = t1 − t− 1 + t2 − 1 / T.

Since 1/ T → 0 for large n, we ignore this contribution.

We can examine the other cases similarly. In general then, the probability a link flips from positive to negative can be calculated as π + = (1 − p)t1 since the probability to select a 41 triad is t1 , and the flip 41 → 40 happens with probability 1 − p. The probability a link flips from negative to positive is then π − = pt1 + t3 since 41 → 40 happens with probability p, and if we have selected a triad 43 (which happens with probability t3 ), it will always switch from negative to positive (as 43 does not have positive links). We approximate the original dynamics by a continuous time differential equation. Let us first look how the proportion of 40 changes. With probability a link changes from negative to positive. The probability a negative link is attached to a triad of type 41 is t− 1 , so the probability that 41 → 40 + a link changes from positive to negative, and is π − t− . With probability π 1 the probability a positive link is attached to a triad of type 40 is t+ 0 . So with probability π + t+ a triad 4 → 4 . Similarly working out the other 0 1 0 π−

169

8

Models of social balance

possibilities yields + + t˙0 = π − t− 1 − π t0 , − − − − + + t˙1 = π + t+ 0 + π t2 − π t1 − π t1 , t˙2 = π + t+ + π − t− − π − t− − π + t+ , 1

3

2

− − t˙3 = π + t+ 2 − π t3 .

2

(8.1a) (8.1b) (8.1c) (8.1d)

Let us analyse the stationary states of system (8.1). First observe that in a stationary state, the proportion of triads remains constant, so that the proportion of positive links ρ should also remain constant. Hence ρ˙ = − π + − π − = 0 and π + = π − . Using π + = π − , we obtain that t+ 0 = t1 , + − + − + − + − t1 = t2 and t2 = t3 . By forming products t0 t2 = t1 t1 and so forth, we obtain 3t0 t2 = t21 and 3t1 t3 = t22 . Furthermore, because π + = π − we obtain that (1 − 2p)t1 = t3 . We then obtain t3 = q3 t0 , t2 = 3q2 t0 , t1 = 3qt0 , p where q = 3(1 − 2p) for p < 1/2 and q = 0 for p ≥ 1/2. With the normalization ∑k tk = 1 we arrive at   3 3−k tk = ρ (1 − ρ∗ )k , (8.2) k ∗ where

( ρ∗ =

1 q+1

for p < 1/2

1

for p ≥ 1/2

(8.3)

is the stationary proportion of friendly links ρ. binomial distribution

Notice that the proportion of triads are distributed according to a simple binomial distribution for p < 1/2. Hence, for infinitely large networks, this model converges to a distribution of triads and not to social balance for p < 1/2. Notice that for finite size networks it will necessarily converge to a socially balanced state, since the model runs until there are no longer any unbalanced triads. Since a balanced state is reached with non-zero probability, we are sure that after waiting long enough, the model should reach social balance. However, the analysis of large n shows that the model may 170

Discrete models

spend much time in a quasi-stationary state around the binomial distribution. For p > 1/2 the model will always converge to social balance, but consisting only of a single faction, and all links will be positive. Simulations also show this transition around p ≈ 1/2. Obtaining non trivial social balance (i.e. not consisting of a single faction) using Local Triad Dynamics (LTD) is therefore not straightforward. Although for a finite size, it will always end up in a socially balanced state 2 in the end, this may take a very long time (about en from simulations (Antal, Krapivsky and Redner, 2005)), and the system is expected to spend much time in a quasi-stationary state around an uncorrelated distribution of triads. Perhaps the Constrained Triad Dynamics (CTD) works better in this regard, since it only flips signs if it improves social balance. Hence, social balance can only increase in CTD. We will now investigate that model to some extent 8.1.2 Constrained triad dynamics Because in the model using Constrained Triad Dynamics (CTD) the updates depend on whether a specific link improves social balance or not, it is rather difficult to model its dynamics, also in the limit of large n. Instead, the focus here is on so-called jammed states: configurations of positive and negative links such that no sign can be flipped in order to improve social balance. Hence, the CTD becomes stuck in such a local maximum, as it has no way of changing any link. Nonetheless, it was found that, even though these jammed states exists, the dynamics often still converge to social balance, without being stuck in a jammed stated. Moreover, it does so more quickly then LTD. We will discern two types of jammed states, following (Marvel, Strogatz and Kleinberg, 2009), strict, and weak jammed states. First let us define the energy U of a configuration. Definition 8.1. Let A be a complete signed adjacency network (without self loops). We then define the energy as

U ( A) =

1 1 Ai j A jk Aki = n Tr A3 . (n3 ) ∑ ( 3) i jk

This notion of energy simply counts how many triads are balanced (so have a positive sign) compared to the total number of triads (n3 ). Clearly in 171

Constrained Triad Dynamics

8

Models of social balance

balanced networks all triads have positive sign, and so U = 1. A network that consists only of negative links clearly has U = −1. We can now define strict and weak jammed states. Definition 8.2. Let A be a complete signed adjacency network. Let Ai0 j be the

signed adjacency matrix with sign Ai0 j = − Ai j flipped for link i j. We call A a strict jammed stated whenever A is unbalanced and for all i, j, we have U ( A) > U ( A0 ) and a weak jammed state if U ( A) ≥ U ( A0 ). Notice that this is equivalent to saying that each edge i j must have Ai j ∑ A jk Aki ≥ − Ai j ∑ A jk Aki . k

(8.4)

k

since otherwise flipping i j would improve the energy U. This is equivalent to saying that more than half of the triads in which the i j participates should be balanced. It can then be easily seen that no jammed state can have U < 0 Lemma 8.3. Let A be a jammed state. Then U ( A) ≥ 0.

Proof. For all edges i j we have that Ai j ∑ A jk Aki ≥ 0, k

otherwise Ai j ∑k A jk Aki ≥ − Ai j ∑k A jk Aki and flipping i j would improve U. Hence U ( A) =

=

1 Ai j A jk Ak j (n3 ) ∑ i jk

(8.5)

1 (n3 )

(8.6)

∑ Ai j ∑ A jk Ak j ≥ 0. ij

k

Notice that hence also Tr( A) ≥ 0 for jammed states. Hence, when looking for jammed states, we know that if U ( A) < 0 the state is definitely not jammed. Strict jammed states only exist for n = 9 and n ≥ 11 and jammed states only exist for n = 6 or n ≥ 8, we will only show the former. For that we first need the following observation. 172

Continuous time squared model

Lemma 8.4. Let T1 = (i, j, k ) be an unbalanced triad and T2 = (i, v, k ) be a balanced triad. Then either T3 = (i, j, v) or T4 = ( j, v, k) is unbalanced.

Proof. sgnT3 sgnT4 = Ai j A jv Avi A jv Avk Ak j

= sgnT1 sgnT2 = −1.

Theorem 8.5. Strict jammed states only exist for n = 9 and n ≥ 11.

Proof. Let A be a jammed state of n = 2r an even number of nodes with inbalanced triad (i, j, k). Let (i, k, vs ) be a balanced triad, of which at least q ≥ r of the 2r − 2 triads are balanced (otherwise we could flip the sign of (i, k)). By the previous lemma, for each vs either (i, j, vs ) or ( j, vs , k) is unbalanced. Denote by x the number of times (i, j, vs ) is unbalanced, and by y the number of times y is unbalanced. Then x + y = q. Since there can be at most r triads unbalanced for the edge (i, j) (otherwise we could flip its sign), we also have that x + 1 ≤ r − 2. Similarly, y + 1 ≤ r − 2, and hence x + y + 2 ≤ 2r − 4 or r ≥ 6 so that n ≤ 12. For n = 2r + 1 an odd number of nodes we obtain similarly n ≤ 9. Furthermore, it can be proven that if the positive graph G + is a Payley graph, and the remaining edges are negative, it is a jammed state (Marvel, Strogatz and Kleinberg, 2009). We can hence conclude that the CTD does not necessarily converge towards a socially balanced state, because of these jammed states. Nonetheless, it was observed by simulations that the probability to get stuck in a jammed state approaches 0 for large n.

8.2

Continuous time squared model As shown in the previous section, the discrete model shows some difficulties in attaining social balance. Using local triad dynamics, the system spends a large amount of time in a quasi stationary state in which the triad densities are uncorrelated. Using constrained triad dynamics, the system might be stuck in jammed states. It was suggested that by using continuous time dynamics, one would obtain a model that would always converge to social balance (Kulakowski, Gawronski and Gronek, 2005). 173

8

Models of social balance

The suggested model has the following form. We denote by Xi j ∈ R the relationship between i and j, such that when Xi j < 0 the two nodes i and j are enemies, and if Xi j > 0 the two are friends. For simplicity, we assume a complete graph, including self-loops, so that the matrix X is complete. The relationships are assumed to change according to X˙ i j =

∑ Xik Xk j

or

X˙ = X 2 ,

(8.7)

k

where X˙ represents the time derivative. The idea behind this model is that reputations are adjusted based on the outcome of a particular gossiping process. More specifically, suppose that Bob (individual i) wants to revise his opinion about John (individual j). Bob then asks everybody else in the network what they think of John. If one such opinion Xk j has the same sign as the opinion Bob has about his gossiping partner, i.e. as Xik , then Bob will be increase his opinion about John. But if these opinions differ in sign, then Bob will decrease his opinion about John.

The fundamental question is whether or not the solutions of Eq. (8.7) evolve towards a state which corresponds to a balanced network. As usual, we are only interested in the signs of the links, not the weights themselves. This model has the tendency to blow-up, as we will see, and so we normalize in order to facilitate the analysis, and we study X (t) , | X (t)| F

(8.8)

X (t) = uv> | X (t)| F

(8.9)

lim

t→t∗

Frobenius norm unitarily invariant

√ where | X | F = Tr XX> denotes the Frobenius norm. The Frobenius norm is unitarily invariant so that |UXU> | F = | X | F for a unitary matrix U (i.e. UU> = I with I the identity). If this limit is socially balanced, the system attains a socially balanced state. Recall from theorem 7.4 that X is balanced if and only X = uv> for some u and v such that ui vi > 0. Hence, X (t) will be balanced if and only if lim∗

t→t

for some u and v with ui vi > 0. In particular, if u = v then X (t) is balanced. Notice that if u 6= v then only the weights can be different, but that the signs must be the same. Hence, we could also say that X (t) is balanced if 174

Continuous time squared model

and only if lim sgn

t→t∗

X (t) = uu> . | X (t)| F

(8.10)

It will be convenient to consider the decomposition of X in a symmetric and skew-symmetric part, X = S + A with S = S> and A = − A> . The symmetric and anti-symmetric part can be uniquely defined as S=

X − X> X + X> , A= . 2 2

skew-symmetric matrix

(8.11)

Notice that h S, Ai = Tr SA> = − Tr SA> = 0, so that A ⊥ S. We denote by S and A the set of symmetric and skew-symmetric matrices respectively. Furthermore, we denote by In the n × n identity matrix, and by Jn a specific skew symmetric matrix: Jn =

0 − In/2

In/2 0

! , n even.

(8.12)

Now let us look under what conditions social balance is attained. Normal initial condition We start by defining

N = { X ∈ Rn×n | XX> = X> X }, >

>

= ∂X∂t X if X (0) ∈ N the set of real, normal matrices . Notice that ∂XX ∂t 2 ˙ so that the set N is invariant for X = X . Furthermore, a symmetric matrix X = X> is obviously normal, which extends the analysis of Marvel, Kleinberg, Kleinberg et al. (2011) to that of normal matrices. Recall that normal matrices are (block)-diagonalizable with blocks of size at most 2 by an orthogonal transformation: if X0 ∈ N , then U> X0 U = Λ0 ,

(8.13)

where Λ0 consists of real 1 × 1 scalar blocks Ai and real 2 × 2 blocks B j = α j I2 + β j J2 with β j 6= 0. ˙ = Λ2 , Note that if Λ(t) is the solution to the initial value problem Λ Λ(0) = Λ0 , then X (t) := UΛ(t)U> is the solution to Eq. (8.7). This shows it is sufficient to solve system Eq. (8.7) in case of scalar X or in case of 175

normal matrix

diagonalizable orthogonal

8

Models of social balance

a specific, 2 × 2, normal matrix X. The scalar case is easy to solve: the solution of x˙ = x2 , x(0) = x0 , is x(t) =

x0 , 1 − x0 t

(8.14)

which is easily verified. For x0 < 0 this is valid for time t ∈ [0, ∞) while for x0 > 0 this is valid for time t ∈ [0, 1/ x0 ) and it blows up at time t∗ = 1/ x0 , while for x0 = 0, x(t) = 0. We turn to the 2 × 2 case by considering: X˙ = X 2 , X (0) = α I2 + βJ2 , where β > 0.

(8.15)

Lemma 8.6. The forward solution X (t) of Eq. (8.15) is defined for all t ∈ [0, +∞),

and

lim X (t) = 0 and lim

t→+∞

t→+∞

√ X (t) 2 =− I2 . | X (t)| F 2

Proof. Let X0 = S0 + A0 , S0 = α I2 and A0 = βJ2 where J2 is as defined in Eq. (8.12). Then the solution X (t) of Eq. (8.15) can be decomposed as S(t) + A(t), where S˙ = S2 + A2 , S(0) = S0 , A˙ = AS + SA, A(0) = A0 . Riccati

(8.16a) (8.16b)

Note that Eq. (8.16a) is a matrix Riccati differential equation (Abou-Kandil, 2003) with the property that the set L := {sI2 + aJ2 |s, a ∈ R}, is an invariant set under the flow. Therefore it suffices to solve the scalar Riccati differential equation corresponding to the dynamics of the scalar coefficients s and a: s˙ = s2 − a2 , s(0) = α,

a˙ = 2as, a(0) = β,

(8.17a) (8.17b)

whose solution is given implicitly by:    2 1 2 1 s2 + a − = if c 6= 0, 2c 2c where c is an integration constant. So, the orbits form circles which are centred at (0, 1/2c) and pass through (0, 0), and by a = 0 if c = 0. The phase portrait of system (8.17) is illustrated in Fig. 8.1. 176

a

Continuous time squared model

0

0 s Fig. 8.1 Phase portrait of complex eigenvalue

All solutions (s(t), a(t)) of system 8.17, not starting on the s-axis, converge to zero as t → +∞, and approach the origin in the second quadrant for solutions in the upper-half-plane, and in the third quadrant for solutions in the lower-half-plane. Moreover, since the s-axis is the tangent line to every circular orbit at the origin, the slopes a(t)/s(t) converge to 0 along every solution limt→+∞ a(t)/s(t) = 0. Consequently, the forward solution X (t) of Eq. (8.15) satisfies: lim X (t) = lim s(t) I2 + a(t) J2 = 0,

t→+∞

and

t→+∞

√ 2 X (t) =− I2 . lim t→+∞ | X (t )| F 2

Combining the solution for the scalar and 2 × 2 case yields our main 177

8

Models of social balance

result in the normal case: Theorem 8.7. Let X0 ∈ N , and let (U, Λ0 ) be as in Eq. (8.13). Define

( t¯i =

1/ ai if ai > 0

+∞ if ai ≤ 0

for all i = 1, . . . , k,

where ai correspond to a real eigenvalue, and let t¯ = mini t¯i . Then the forward solution X (t) of Eq. (8.7) is defined for [0, t¯). If there is a unique i∗ ∈ {1, . . . , k} such that t¯ = t¯i∗ is finite, then lim

t→t¯i∗ −

X (t) = Ui∗ U> i∗ , | X (t)| F

where Ui∗ is the i∗ th column of U, an eigenvector corresponding to eigenvalue ai∗ of X0 . Proof. Consider the initial value problem: ˙ = Λ2 , Λ(0) = Λ0 . Λ Its solution is given by 

a1 1− a1 t

 .  ..   0  Λ(t) =   0   ..  . 0

... .. . ... ... .. . ...

0 .. .

ak 1− ak t

0 .. . 0

0 .. . 0 X1 (t) .. . 0

... .. . ... ... .. . ...

 0 ..  .   0   , 0   ..  .  Xl (t)

where for all j = 1, . . . , l, X j (t) is the forward solution of Eq. (8.15), which is defined for all t in [0, +∞), and converges to 0 as t → +∞ by Lemma 8.6. This clearly shows that Λ(t) is defined in forward time for t in [0, t¯). Since the solution of Eq. (8.7) is given by X (t) = UΛ(t)U> , X (t) is also defined in forward time for t in [0, t¯). It follows from unitary invariance of the Frobenius norm that Λ(t) > X (t) =U U . | X (t)| F |Λ(t)| F 178

Continuous time squared model

If i∗ ∈ {1, . . . , k} is the unique value such that t¯ = t¯i∗ , then using the unitary invariance lim

t→t¯i∗

X (t) Λ(t) > = U lim∗ U = Uei∗ e>i∗ U> = Ui∗ U> i∗ , | X (t)| F t→t¯i |Λ (t )| F

where ei∗ denotes the i∗ th standard unit basis vector of Rn .

Theorem 8.7 provides a sufficient condition guaranteeing that social balance is achieved as stated in theorem 7.4.

Generic initial condition Although theorem 8.7 provides a sufficient condition for the emergence of social balance, it requires that the initial condition X0 is normal. But the set N of normal matrices has measure zero in the set of all real n × n matrices, and thus the question arises if social balance will arise for nonnormal initial conditions as well. We investigate this issue here, and will see that generically, social balance is not achieved. If X0 is a general real n × n matrix, we can put it in real Jordan canonical form by means of a similarity transformation: X (0) = TΛ0 T −1 , TT −1 = In ,

(8.18)

with Λ0 = diag( A1 , . . . , Ak , B1 , . . . , Bl ), where Ai are real Jordan blocks and   Ci I2 . . . 0    0 Ci . . . 0   Bj =  (8.19) . .. . . ..  , C j = α j I2 + β j J2 ,  ..  . . . 0

0

...

Jordan form

Jordan block

Ci

with β j 6= 0. The analysis could be done similarly using complex eigenvalues, but we prefer to remain in the real domain. We again observe that if Λ(t) is the solution to the initial value prob˙ = Λ2 , Λ(0) = Λ0 , then X (t) := TΛ(t) T −1 , is the solution to lem Λ Eq. (8.7). Again, it is sufficient to solve system (8.7) in case of specific block-triangular X of the form Ai or B j as in Eq. (8.19). To deal with the first form Ai , we first we consider more general, triangular Toeplitz initial 179

Toeplitz matrix

8

Models of social balance

conditions:    X (0) =   

 · · · xn (0)  .. . xn−1 ( 0 )  x1 (0) ,  .. .. ..  . . . 0 ··· x1 (0)

x1 (0)

x2 (0)

0 .. . 0

(8.20)

with xi (0) reals, and denote T T = { X | X is of the form (8.20)}. It turns out that this is an invariant set for the system, which can be easily verified by noting that if X belongs to T T , then so does X 2 . Lemma 8.8. Let X (0) ∈ T T with

xi ( 0 ) =

    a 6= 0 if i = 1 1 if i = 2   0 otherwise

.

Then the forward solution X (t) of Eq. (8.7) is defined on [0, t∗ ) where t∗ = 1/ a if a > 0 and on t∗ = ∞ if a ≤ 0, belongs to T T , and satisfies  xi ( t ) = pi

1 1 − at



, t ∈ [0, t∗ ),

where each pi ( z) is a polynomial of degree i: ( pi ( z ) =

az if i = 1 1 i z ai −2

+ · · · + ci z2 otherwise

,

(8.21)

where ci is some real constant, so that pi ( z) has no constant or first order terms when i > 1. Proof. First note that system (8.7) can be solved recursively for matrices of type (8.20), starting with x1 (t), followed by x2 (t), x3 (t), . . . . Only the first equation for x1 is non-linear, whereas the equations for x2 , x3 , . . . are linear. To see this, we write these equations:  2    x1 , x1 (0) = a if i = 1 x˙ i =

(2x1 (t)) x2 , x2 (0) = 1 if i = 2   (2x (t)) x + ∑i−1 x (t) x 1 i i −(k−1) (t ), xi (0 ) = 0 if i > 2 k=2 k

The forward solution for x1 is x1 (t) = 180

a 1− at , for t

.

∈ [0, t∗ ), which establishes

Continuous time squared model

the result if i = 1. The forward solution for x2 is: x2 (t) =

[0, t∗ ),

1 , (1− at)2

for

t ∈ which establishes the result if i = 2. If i > 2, we obtain the proof by induction on n. Assume the result holds for i = 1, . . . , n, for some n ≥ 2, and consider the equation for xn+1 . Using that xn (0) = 0 for n ≥ 2, the solution is given by: xn+1 ( t ) = e Since e

Rt 0

Rt

2x1 (s)ds

0

" 2x1 (s)ds

0+

0

∑ xk ( s ) xn−k+2 ( s )

"Z

e

Rs 0

# −2x1 (τ )dτ

ds .

k=2

= x2 (t) and thus e

1 xn+1 ( t ) = (1 − at)2

!

n

Z t

Rs 0

−2x1 (τ )dτ

= 1/ x2 (s), it follows that:

t n 0

∑ pk (1/(1 − as))

k=2



# 2

pn−k+2 (1/(1 − as)) (1 − as) ds . Since the polynomials appearing in the integral take the form of Eq. (8.21), they are all missing first order and constant terms, and thus there follows that 1 xn+1 ( t ) = (1 − at)2

"Z

t n 0



k=2

1 an−2

1 + (1 − as)n+2

 1 · · · + ck cn−k+2 (1 − as)2 ds (1 − as)4

#

and so that xn+1 ( t ) =

1 1 cn+1 +···+ , t ∈ [0, t∗ ), an−1 (1 − at)n+1 (1 − at)2

where Kn+1 and cn+1 are certain constants (which are related in some way which is irrelevant for what follows). This shows that xn+1 (t) is indeed of the form pn+1 (1/(1 − at)) with pn+1 ( z) as in Eq. (8.21).

Next we consider Eq. (8.7) in case X (0) is a block triangular Toeplitz 181

8

Models of social balance

initial condition:    X (0) =   

··· .. . B1 (0) .. .. . . 0 ···

B1 (0)

B2 (0)

0 .. . 0

Bn (0)



 Bn−1 (0) ,  ..  . B1 (0)

(8.22)

with Bi (0) = αi I2 + βi J2 with αi , βi ∈ R, and denote

BT T = { X | X is of the form (8.22)}. Again the set BT T is invariant for system (8.7). We use this to solve Eq. (8.7) in case X (0) is a real Jordan block corresponding to a pair of eigenvalues α ± jβ. Lemma 8.9. Let X (0) ∈ BT T with

Bi (0) =

  αI2 + βJ2 if i = 1 

.

I2 if i = 2   0 otherwise

Then the forward solution X (t) of Eq. (8.7) is defined on [0, +∞), and it belongs to BT T . Proof. Just like in the proof of proposition 8.8, we note that system (8.7) can be solved recursively, starting with X1 (t), followed by X2 (t), X3 (t), . . . . Only the first equation for X1 is non-linear, whereas the equations for X2 , X3 , . . . are linear. To see this, we write these equations:  2    X1 , X1 (0) = α I2 + βJ2 if i = 1 X˙ i = (2X1 (t)) X2 , X2 (0) = I2 if i = 2 .   (2X (t)) X + ∑i−1 X (t) X (t), X (0) = 0 if i > 2 1

i

k=2

k

i −(k−1)

i

Here we have used the fact that X1 Xi + Xi X1 = 2X1 Xi , since any two matrices of the form pI2 + qJ2 commute and the matrices Xi (t) are of this form. By Lemma 8.6, the forward solution for X1 (t) is defined for all t in [0, +∞) (and in fact, converges to zero as t → +∞). Since the X1 (t) commute for every pair of t’s, the forward solution for Rt X2 (t) is given by Rugh (1996) X2 (t) = e 0 2X1 (s)ds , for t ∈ [0, +∞), where 182

Continuous time squared model

X˙ = X 2 What does k think of j?

What does i think of k? k

i

j

X (0)

X (t ∗ )

t

The link to be updated.

Fig. 8.2 Generic behaviour of X˙ = X 2

this solution exists for all forward times t because X1 (t) is bounded and continuous. Similarly, the forward solution for Xi (t) when i > 2, is given by the variation of constants formula: Xi (t) = X2 (t)

"Z

t 0

X2−1 (s)

i −1

∑ Xk (s)Xi−(k−1) (s)

!

# ds ,

k=2

for t ∈ [0, +∞) when i > 2, where these solutions are recursively defined for all forward times because the formula only involves integrals of continuous functions.

Combining both results puts us in a position to state and prove our main result. Theorem 8.10. Let X (0) ∈ Rn×n and ( T, Λ0 ) as in Eq. (8.18) with (8.19). Let

a1 > a2 ≥ · · · ≥ ak with a1 > 0 a simple eigenvalue with corresponding right and left-eigenvectors U1 and V> 1 respectively: > X (0)U1 = a1 U1 and V> 1 X (0 ) = a1 V1 .

Then the forward solution X (t) of Eq. (8.7) is defined for [0, 1/ a1 ), and lim

t→1/ a1

U1 V> X (t) 1 = . | X (t)| F |U1 V> 1 |F

˙ = Λ2 , Λ(0) = Λ0 , whose Proof. Consider the initial value problem Λ 183

8

Models of social balance

solution is given by Λ(t) = diag( A1 (t), . . . , Ak (t), B1 (t), . . . , Bl (t)), where for all i = 1, . . . , k, Ai (t) is the forward solution of Eq. (8.7) with Ai (0) of the form Ai in (8.19), which by Lemma 8.8 is defined for all t ∈ [0, 1/ ai ). Since a1 > a2 ≥ · · · ≥ ak , A1 (t) blows up first when t → 1/ a1 . The matrices B j (t), j = 1, . . . , l, are the forward solution of Eq. (8.7) with B j (0) of the form B j in Eq. (8.19), and by Lemma 8.9, they are defined for all t in [0, +∞). This clearly shows that Λ(t) is defined in forward time for t in [0, 1/ a1 ). Since the solution of Eq. (8.7) is given by X (t) = TΛ(t) T −1 , X (t) is also defined in forward time for t in [0, 1/ a1 ), and it follows that lim

t→1/ a1

TΛ(t) T −1 X (t) = lim | X (t)| F t→1/ a1 | X (t )| F

=

U1 V> Te1 e>1 T −1 1 = , | Te1 e>1 T −1 | F |U1 V> 1 |F

where e1 denotes the first standard unit basis vector of Rn . Theorem 8.10 implies that social balance is usually not achieved when X (0) is an arbitrary real initial condition, illustrated in Fig. 8.2. Indeed, if X0 has a simple, positive, real eigenvalue a1 , and if we assume that no entry of the right and left eigenvectors U1 and V> 1 are zero (an assumption which is generically satisfied), then in general, up to a permutation of its entries, the sign patterns of U1 and V> 1 are:   + +   U1 =   and V> 1 = + − −



+ −



implies that 

+ +  U1 V> 1 = − −

− − + +

+ + − −

 − −  . + +

Then theorem 7.4 implies that the normalized state of the system does not 184

Continuous time transpose model

become balanced in finite time. This shows that in general, unless X0 is normal (so that theorem 8.7 is applicable), we cannot expect that social balance will emerge for the model X˙ = X 2 .

8.3

Continuous time transpose model The previous model X˙ = X 2 will in general not converge to social balance, unless the initial condition is normal with a positive single real eigenvalue. Hence, for general initial conditions, we do not expect the model to converge to social balance. Is remains open to see what model then is expected to converge to social balance in general. In this section we will suggest such a model, and prove that generically it converges to social balance. Let us briefly reconsider the gossiping process underlying the model ˙ X = X 2 . In our example of Bob and John, the following happens. Bob asks others what they think of John. Bob takes into account what he thinks of the people he talks to, and adjusts his opinion of John accordingly. An alternative approach is to consider a type of homophily process (Mcpherson, Smith-Lovin and Cook, 2001; Durrett and Levin, 2005; Fu, Nowak, Christakis et al., 2012): people tend to befriend people who think alike. When Bob seeks to revise his opinion of John, he talks to John about everybody else (instead of talking to everybody else about John). For example, suppose that Bob likes Alice, but that John dislikes her. When Bob and John talk about Alice, they notice they have opposing views about her, and as a result the relationship between Bob and John deteriorates. On the other hand, should they share similar opinions about Alice, their relationship will improve. Thus, our alternative model for the update law of the reputations is: X˙ i j =

∑ Xik X jk

or

X˙ = XX> , X (0) = X0 ,

(8.23)

k

where again, each Xi j denotes the real-valued opinion agent i has about agent j. Notice that for i = j, the value of Xii is interpreted as a measure of 2 ≥ 0 contrary to the earlier self-esteem of agent i. In this case X˙ ii = ∑k Xik model, and so the self-esteem is always increasing. We shall call this model the “transpose model”, because of the transpose we use in the model. Notice that an alternative specification could be X˙ = X> X, in which case Bob and John don’t talk about what they think of Alice, but what Alice thinks 185

8

Models of social balance

of them. Although this seems to be less realistic, it might be an interesting model to study nonetheless. In this thesis we will limit ourselves to the model X˙ = XX> . As in the case of model X˙ = X 2 , we split up the analysis in two parts. First we consider system (8.23) with normal initial condition X0 , and we shall see that not all initial conditions lead to the emergence of a balanced network in this case, in contrast to the behaviour of Eq. (8.7). Secondly, we will see that for non-normal, generic initial conditions X0 , we typically do get the emergence of social balance, also contrasting the behaviour of Eq. (8.7). Normal initial condition normal matrix

As for the model X˙ = X 2 the set N of normal matrices is invariant for X˙ = XX> . By using the same diagonalisation as in Eq. (8.13), if Λ(t) is the ˙ = ΛΛ> , Λ(0) = Λ0 , then X (t) := solution to the initial value problem Λ > UΛ(t)U , is the solution to Eq. (8.23). This shows it is sufficient to solve system (8.23) in case of scalar X or in case of a specific 2 × 2 normal matrix X. The scalar case is easy to solve and follows Eq. (8.14), so we turn to the 2 × 2 case by considering X˙ = XX> , X (0) = α I2 + βJ2 , where β 6= 0.

(8.24)

We define the angle φ as φ = arctan

   π π α , φ∈ − , . β 2 2

(8.25)

Lemma 8.11. Define t¯ as

φ π t¯ = − . 2β β

(8.26)

Then the forward solution X (t) of Eq. (8.24) is: X (t) = β tan(βt + φ) I2 + βJ2 , t ∈ [0, t¯).

(8.27)

Moreover, lim X (t) = +∞I2 + βJ2 and lim

t→t¯−

t→t¯−

√ X (t) 2 = I2 . | X (t)| F 2

Proof. Let X0 = S0 + A0 , S0 = αI2 , and A0 = βJ2 . Then the solution X (t) 186

Continuous time transpose model

of Eq. (8.24) can be decomposed as S(t) + A(t), where S˙ = ( S + A)( S − A), S(0) = S0 , A˙ = 0, A(0) = A0 ,

(8.28a) (8.28b)

so A(t) = A0 , and reduces to S˙ = ( S + A0 )( S − A0 ), S(0) = S0

(8.29)

Note that Eq. (8.29) is a matrix Riccati differential equation with the property that the line L = {αI2 |α ∈ R}, is an invariant set under the flow. Therefore it suffices to solve the scalar Riccati differential equation corresponding to the dynamics of the diagonal entries of S: s˙ = s2 + β2 , s(0) = α, whose forward solution is: s(t) = β tan (βt + φ) , for t ∈ (0, t¯), where t¯ is given by Eq. (8.26). Consequently, the forward solution X (t) of Eq. (8.24) is given by: X (t) = S(t) + A0 = β tan(βt + φ) I2 + βJ2 , for t ∈ (0, t¯), and thus limt→t¯− X (t) = +∞I2 + βJ2 and

√ X (t) X (t) 2 = √ = I2 . lim ¯ | X ( t )| 2 t→t− 2|β sec(βt + φ)| F

Combining the solution for the 1 × 1 scalar case in Eq. (8.14) and Lemma 8.11 yields our main result: Theorem 8.12. Let X0 ∈ N , and let (U, Λ0 ) be as in Lemma 8.13. Define

( t¯i =

1/ ai if ai > 0

+∞ if ai ≤ 0

for all i = 1, . . . , k,

and

φj π − for all j = 1, . . . , l, t¯ j = 2β j βj α  where φ j = arctan β j and let t¯ = mini, j {t¯i , t¯ j }. Then the forward solution j X (t) of Eq. (8.23) is defined for [0, t¯). If there is a unique i∗ ∈ {1, . . . , k} such that t¯ = t¯i∗ is finite, then lim

t→t¯i∗ −

X (t) = Ui∗ U> i∗ , | X (t)| F 187

Riccati

8

Models of social balance

where Ui∗ is the i∗ th column of U, an eigenvector corresponding to eigenvalue ai∗ of X0 . If there is a unique j∗ ∈ {1, . . . , l } such that t¯ = t¯ j∗ , then lim

t→t¯ j∗ −

√ X (t) 2 U ∗ U>∗ , = | X (t)| F 2 j j

where U j∗ is an n × 2 matrix consisting of the two consecutive columns of U which correspond to the columns of the 2 × 2 block B j∗ in Λ0 . Proof. Consider the initial value problem: ˙ = ΛΛ> , Λ(0) = Λ0 . Λ By Lemma 8.11 its solution is given by 

a1 1− a1 t

 .  ..   0  Λ(t) =   0   ..  . 0

... .. . ... ... .. . ...

0 .. .

ak 1− ak t

0 .. . 0

0 .. . 0 X1 (t) .. . 0

... .. . ... ... .. . ...

 0 ..  .   0   , 0   ..  .  Xl (t)

where for all j = 1, . . . , l, X j (t) is given by the 2 × 2 matrix in Eq. (8.27) with β, φ and t¯ replaced by β j , φ j and t¯ j respectively. This clearly shows that Λ(t) is defined in forward time for t in [0, t¯). Since the solution of Eq. (8.23) is given by X (t) = UΛ(t)U> , X (t) is also defined in forward time for t in [0, t¯). It follows from unitary invariance of the Frobenius norm that X (t) Λ(t) > =U U . | X (t)| F |Λ(t)| F If i∗ ∈ {1, . . . , k} is the unique value such that t¯ = t¯i∗ , then lim

t→t¯i∗

X (t) Λ(t) > = U lim∗ U | X (t)| F t→t¯i |Λ (t )| F

= Uei∗ e>i∗ U> = Ui∗ U> i∗ ,

where ei∗ denotes the i∗ th standard unit basis vector of Rn . If j∗ ∈ {1, . . . , l } is the unique value such that t¯ = t¯ j∗ , then by Lemma 188

Continuous time transpose model

8.11: lim

t→t¯∗j

X (t) Λ(t) > = U lim∗ U | X (t)| F t→t¯ j |Λ (t )| F √ √ 2 2 > UE j∗ U = U ∗ U>∗ , = 2 2 j j

where E j∗ has exactly two non-zero entries equal to 1 on the diagonal positions corresponding to the block B j∗ in Λ0 . A particular consequence of theorem 8.12 is that if X0 has a complex pair of eigenvalues, the solution of X˙ = XX> always blows up in finite time, even if all real eigenvalues of X0 are non-positive. Recall that the solution of X˙ = X 2 blows up in finite time, if and only if X0 has a positive, real eigenvalue. Another implication of theorem 8.12 is that if blow-up occurs, it may be due to a real eigenvalue of X0 , or to a complex eigenvalue. In contrast, if the solution of X˙ = X 2 blows up in finite time, it is necessarily due to a positive, real eigenvalue, and never to a complex eigenvalue. When the solution of X˙ = XX> blows up because of a positive, real eigenvalue of X0 , the system will achieve balance, just as in the case of system X˙ = X 2 . If on the other hand, finite time blow up of X˙ = XX> is caused by a complex eigenvalue of X0 , we show that in general one cannot expect to achieve a balanced network. Assume there is a unique j∗ such that:

√ X (t) 2 lim = U ∗ U>∗ , ∗ 2 j j t→t¯ j − | X (t )| F Assuming that no entry of U j∗ is zero, the sign pattern of U j∗ U>j∗ , with p1  p2 U ∗j =  − p3 − p4 

 q1 −q2   q3  −q4

is given by:  + ? ? − ? + − ?   ? − + ?, − ? ? + 

189

8

Models of social balance

up to a suitable permutation, where all pi and qi , i = 1, . . . , 4, are entrywise positive vectors, and where

h p1 , q1 i + h p4 , q4 i = h p2 , q2 i + h p3 , q3 i, because U is an orthogonal matrix. The ? are not entirely arbitrary because U j∗ U>j∗ is a symmetric matrix, but besides that their signs can be arbitrary.

Generic initial condition Consider X˙ = XX> , X (0) = X0 ,

(8.30)

where X is a real n × n matrix, which is not necessarily normal. skew-symmetric matrix

We first decompose the flow (8.30) into flows for the symmetric and skew-symmetric parts of X. Let X = S + A, X0 = S0 + A0 , where S, S0 ∈ S and A, A0 ∈ A are the unique symmetric and skew-symmetric parts of X and X0 respectively. If X (t) satisfies Eq. (8.30), then it can be verified that S(t) and A(t) satisfy the system: S˙ = ( S + A)( S − A), S(0) = 0, A˙ = 0, A(0) = A0 ,

(8.31) (8.32)

Consequently, A(t) = A0 for all t, and thus the skew-symmetric part of the solution X (t) of Eq. (8.30) remains constant and equal to A0 . Throughout this subsection we assume that A0 6= 0, for otherwise X (0) is symmetric, hence normal, and the results from the previous subsection apply. It follows that we only need to understand the dynamics of the symmetric part. Then the solution X (t) to Eq. (8.30) is given by X (t) = S(t) + A0 , where S(t) solves Eq. (8.31), and in view of S ⊥ A, there follows by Pythagoras’ Theorem that: | X (t)|2F = | S(t)|2F + | A0 |2F , and thus S(t) + A0 X (t) = 1 . | X (t)| F | S(t)|2F + | A0 |2F 2

(8.33)

Next we shall derive an explicit expression for the solution of Eq. (8.31). We start by performing a change of variables: Sˆ (t) = e−tA0 S(t) etA0 . 190

(8.34)

Continuous time transpose model

This yields the equation Sˆ˙ = Sˆ 2 − A20 , Sˆ (0) = S0 .

(8.35)

We perform a further transformation which diagonalizes − A20 . Let V be an orthogonal matrix such that −V> A20 V = D 2 , where D is the diagonal matrix D := diag(0, ω1 I2 , . . . , ωk Ik ) where k ≥ 1 (because A0 6= 0) and all ω j > 0 without loss of generality. Setting ˆ S˜ = V> SV,

(8.36)

and multiplying Eq. (8.35) by V on the left, and by V> on the right, we find that: S˜˙ = S˜ 2 + D 2 , S˜ (0) = S˜ 0 := V> S0 V. (8.37) Notice that this is a matrix Riccati differential equation, a class of equations with specific properties which are briefly reviewed next. Consider a general matrix Riccati differential equation: S˙ = SMS − SL − L> S + N,

Riccati

(8.38)

where M = M> , N = N> and L arbitrary, defined on S . Associated to this equation is a linear system      P˙ P L = H , H : = Q˙ Q N

 −M , − L>

(8.39)

where H is a Hamiltonian matrix, i.e. J2n H = ( J2n H )> holds, where J2n is as defined in Eq. (8.12). The following fact is well-known (Abou-Kandil, 2003). Lemma 8.13. Let



P(t) Q(t)



be a solution of Eq. (8.39). Then, provided that P(t) is

non-singular, S ( t ) = Q ( t ) P ( t )−1 ,

(8.40)

is a solution of Eq. (8.38). if S(t) is a solution of Eq. (8.38), then  Conversely,  P(t) there exists a solution Q(t) of Eq. (8.39) such that Eq. (8.40) holds, provided that P(t) is non-singular. Proof. Taking derivatives in S(t) P(t) = Q(t) yields that S˙ = ( Q˙ − S P˙ ) P−1 , 191

8

Models of social balance

and using Eq. (8.39), S˙ = ( NP − L> Q − S( LP − MQ)) P−1 = N − L> S − SL + SMS, showing that S(t) solves let S(t) be a solution For the converse,   Eq. (8.38).  P(0) P(t) In of Eq. (8.38). Let Q(t) with Q(0) = S(0) be the solution of Eq. (8.39). Then  d  Q ( t ) P−1 ( t ) dt ˙ −1 − QP−1 PP ˙ −1 = QP

=( NP − L> Q) P−1 − QP−1 ( LP − MQ) P−1

=( QP−1 ) M( QP−1 ) − ( QP−1 ) L − L> ( QP−1 ) + N,

implying that QP−1 is a solution to Eq. (8.38). Since S(0) = Q(0) P−1 (0), it follows from uniqueness of solutions that S(t) = Q(t) P−1 (t).

In other words, in principle we can solve the non-linear equation (8.38) by first solving the linear system (8.39), and then use formula (8.40) to determine the solution of Eq. (8.38). We carry this out for our particular Riccati equation (8.37) which is of the form (8.38)with M= In , L = 0, N = D 2 . The corresponding Hamil-

tonian is H =

0 − In D2 0

 D=

positive definite matrix

0 0

. We partition D in singular and non-singular parts:

 ω1 I2 0  .. ˜ ˜ , where D :=  . D 0 

 ... 0 ..  , .. . .  . . . ωk I2

˜ is positive definite since all ω j > 0. Partitioning H correspondwhere D ingly:   − In−2k 0 0 0 0 0 0 − I2k    (8.41) H= . 0 0 0 0  ˜2 0 D 0 0 192

Continuous time transpose model

This matrix is then exponentiated to solve system (8.39): 

P(t) Q(t)

!

In−2k  0  =  0 0

0 c 0 ˜ Ds

−tIn−2k 0 In−2k 0

 0 − D˜ −1 s   0  c

P(0) Q(0)

! ,

where we have introduced the following notation: ˜ ), s(t) := diag(sin(ω1 t) I2 , . . . , sin(ωk t) I2 ) = sin( Dt ˜ ). By setting P(0) = In , and Q(0) = S˜ 0 , and usand similarly c(t) = cos( Dt ing Lemma 8.13, it follows that the solution of the initial value problem 8.37 is given by S˜ (t) = Q(t) P(t)−1 ,  P(t) Q(t)

!

  = 

( In−2k − t) S˜ 0 0 ˜ 0 c(t) − D −1 s(t) S˜ 0   In−2k S˜ 0 0 ˜ (t) + c(t) S˜ 0 0 Ds

   , 

(8.42)

for all t for which P(t) is non-singular. We now make the following assumption: Assumption A. The matrix P(t) is non-singular for all t in [0, t¯), where t¯ is finite

and such that s(t) is non-singular for all t in (0, t¯). Moreover, P(t¯) has rank n − 1, or equivalently, has a simple eigenvalue at zero. Later we will show that this assumption is generically satisfied, and also that t∗ = t¯, (8.43) where [0, t∗ ) is the maximal forward interval of existence of the solution S˜ (t) of the initial value problem (8.37). Consequently, the theory of ODE’s implies that limt→t¯ | S˜ (t)| F = +∞, i.e. that t¯ is the blow-up time for the solution S˜ (t). Assuming for the moment that assumption A is satisfied, back-transformation using Eq. (8.34) and (8.36), yields that the solution S(t) of (8.31) is S(t) = etA0 V S˜ (t)V> e−tA0 , which is defined for all t in [0, t¯), because etA0 V is bounded for all t (as it is an orthogonal matrix). It follows from 193

8

Models of social balance

unitary invariance of the Frobenius norm that lim t→t¯

  S(t) S˜ (t) ¯ ¯ V> e−t A0 , = et A0 V lim | S(t)| F t→t¯ | S˜ (t )| F

(8.44)

provided that at least one of the two limits exists. If we partition S˜ 0 in Eq. (8.42) as follows:   ( S˜ 0 )11 ( S˜ 0 )12 ( S˜ ) = ( S˜ 0 )>11 S˜ 0 = , with ˜ 0 11 , > ˜ ˜ ( S0 )12 ( S0 )22 ( S0 )22 = ( S˜ 0 )>22 we can rewrite P(t) and Q(t) on the time interval (0, t¯) as: P(t) = ∆(t) M(t) with,   tIn−2k 0 ∆(t) = ˜ −1 s ( t ) , 0 D and

 M(t) =

1/t − ( S˜ 0 )11 −( S˜ 0 )>12

and

 Q(t) =

−( S˜ 0 )12 ˜ Dc(t)s−1 (t) − ( S˜ 0 )22

( S˜ 0 )11 c(t)( S˜ 0 )>12



= M> (t),

 ( S˜ 0 )12 ˜ (t) + c(t)( S˜ 0 )22 . Ds

Note that the factorization of P(t) is well-defined on (0, t¯) because by assumption A, the matrix s(t) is non-singular in the interval (0, t¯). Moreover, assumption A also implies there exists a non-zero vector u corresponding to the zero eigenvalue of M(t¯), i.e. M(t¯)u = 0, and that u is uniquely defined up to scalar multiplication because the zero eigenvalue is simple.  More explicitly, partitioning u as uu12 , there holds that 

1/t¯ − ( S˜ 0 )11 −( S˜ 0 )>12

−( S˜ 0 )12 ˜ (t¯)s−1 (t¯) − ( S˜ 0 )22 Dc



u1 u2



= 0.

(8.45)

Notice that M(t) is at least real-analytic on the interval (0, t¯). Hence, it follows from Kato (1995) (see also Bunse-Gerstner, Byers, Mehrmann et al., 1991; Still, 2001), that there is an orthogonal matrix U (t), and a diagonal matrix Λ(t), both real-analytic on (0, t¯), such that: M(t) = U (t)Λ(t)U> (t), for t ∈ (0, t¯), and thus M−1 (t) = U (t)Λ−1 (t)U> (t), for t ∈ (0, t¯). Return-

194

Continuous time transpose model

X˙ = XX T What does i think of k?

What does j think of k? k

j

i

X (0)

X (t ∗ )

t

The link to be updated.

Fig. 8.3

Generic behaviour of X˙ = XX>

ing to Eq. (8.44), we obtain that: lim t→t¯

S(t) Q(t)U (t)Λ−1 (t)U> (t)∆−1 (t) > −t¯A0 ¯ V e = et A0 V lim | S(t)| F t→t¯ | Q (t )U (t )Λ−1 (t )U> (t )∆−1 (t )| F Q(t¯)uu> ∆−1 (t) > −t¯A0 ¯ = et A0 V V e . | Q(t¯)uu> ∆−1 (t)| F

Here, we have used the fact that M−1 (t) is positive definite on the interval (0, t¯), so that its largest eigenvalue (which is simple for all t < t¯ sufficiently close to t¯, because of assumption A approaches +∞ -and not −∞as t → t¯. To see this, note that from its definition follows that M(t) is pos˜ is positive definite. itive definite for all sufficiently small t > 0, because D ¯ Moreover, M(t) is non-singular on (0, t) since by assumption (A), P(t) is non-singular on (0, t¯), and because M(t) = ∆−1 (t) P(t) (it is clear from its definition and assumption A that ∆(t) is non-singular on (0, t¯) as well). Consequently, the smallest eigenvalue of M(t) remains positive in (0, t¯), as it approaches zero as t → t¯. This implies that the largest eigenvalue of M−1 (t) is positive on (0, t¯), and approaches +∞ as t → t¯, as claimed. Note that:

( S˜ 0 )11 ( S˜ 0 )12 ˜ (t¯) + c(t¯)( S˜ 0 )22 c(t¯)( S˜ 0 )>12 Ds   (1/t¯)u = ˜ −1 ¯ 1 = ∆−1 (t¯)u, Ds (t)u2

Q(t¯)u =





u1 u2



where in the second equality, we used the second row of Eq. (8.45) , mul195

8

Models of social balance

tiplied by c(t¯). From this follows that lim t→t¯

S(t) ww> ∆−1 (t¯)uu> ∆−1 (t¯) > −t¯A0 ¯ V e = , = et A0 V −1 | S(t)| F |∆ (t¯)uu> ∆−1 (t¯)| F |ww> | F

where w := et¯A0 V∆−1 (t¯)u. Taking limits for t → t¯ in Eq. (8.33), and using the above equality, we finally arrive at the following result, which implies that system (8.30) evolves to a socially balanced state (in normalized sense) when t → t¯: Proposition 8.14. Suppose that assumption A holds and A0 6= 0. Then the solution X (t) of 8.30 satisfies:

lim t→t¯

ww> X (t) = . | X (t)| F |ww> | F

with w = et¯A0 V∆−1 (t¯)u. This generic behaviour is illustrated in Fig. 8.3. Genericity Generically, assumption A holds, and 8.43 holds as well. There are two aspects to assumption A: 1. The matrix P(t) is non-singular in the interval [0, t¯), but singular at some finite t¯ such that: t¯ < min

j=1,...,k

π . ωj

(8.46)

2. P(t¯) has a simple zero eigenvalue. To deal with the first item, suppose that the solution S˜ (t) of Eq. (8.37) is defined for all t ∈ [0, t∗ ) for some finite positive t∗ . By Lemma 8.13, there exist P(t) and Q(t) such that S˜ (t) = Q(t) P−1 (t), where P(t) and Q(t) are components of the solution of system (8.39) with H defined in Eq. (8.41). Then necessarily t¯ ≤ t∗ . Thus, if we can show that t∗ < min j π /ω j , then Eq. (8.46) holds. To show that t∗ < min j π /ω j , we rely on a particular property of matrix Riccati differential equations (8.38): their solutions preserve the order generated by the cone of non-negative symmetric matrices (see De Leenheer and Sontag, 2004). More precisely, if S1 (t) and 196

Continuous time transpose model

S2 (t) are solutions of Eq. (8.38), and if S1 (0)  S2 (0), then S1 (t)  S2 (t), for all t ≥ 0 for which both solutions are defined. The partial order notation S1 (t)  S2 (t) means that the difference S2 (t) − S1 (t) is a positive semi-definite matrix. We apply this to equation (8.37) with S˜ 1 (0) = αmin In and S˜ 2 (0) = S˜ (0), where we choose αmin as the smallest eigenvalue of S˜ (0) (or equivalently, of S(0) = S0 , since S˜ (0) = V> S0 V), so that clearly S˜ 1 (0)  S˜ 2 (0). Consequently, by the monotonicity property of system (8.37), it follows that S˜ 1 (t)  S˜ (t), as long as both solutions are defined. We can calculate the blow-up time t∗1 of S˜ 1 (t) explicitly, and then it follows that t∗ ≤ t∗1 , where t∗ is the blow-up time of S˜ (t). Indeed, equations of system (8.37) decouple for an initial condition of the form αmin In , and the resulting scalar equations are scalar Riccati equations we have solved before. The blow-up time for S˜ 1 (t) is given by:    min j=1,...,k π − φ j , if αmin ≤ 0  2ω j ω j φ  t∗1 = j 1 π min j=1,...,k , if αmin > 0 αmin , 2ω − ω j

there holds that Consequently,



αmin ωj φj π 2ω j − ω j

with φ j := arctan






M ˙ (t)u j (t) = −u j (t)> 1/t 0

0



˜ 2 s−2 ( t ) u j ( t ) , D

where u j (t) is the normalized eigenvector of M(t) corresponding to λ j (t), ˙ (t) is negative and which is analytic in the considered interval. Since M ˙ definite in that interval, λ j (t) is also negative and hence all eigenvalues of 197

8

Models of social balance

M(t) are strictly decreasing functions of t in that interval. Suppose now that M(t) has a multiple eigenvalue 0 at t = t¯, then M(t¯) is positive semidefinite since t¯ is the first singular point of M(t) and the eigenvalues are decreasing function of t. If we now choose a positive semi-definite ∆ S˜ 0 of nullity 1, such that M(t¯) + ∆ S˜ 0 also has nullity 1, then the perturbed initial condition ( S˜ 0 ) p = S˜ 0 − ∆ S˜ 0 yields the perturbed solution S˜ p (t) which can be factored as Q p (t) Pp−1 (t), and where Pp (t) = ∆(t) M p (t) (note that ∆(t) remains the same as before the perturbation) for M p (t) = M(t) + ∆ S˜ 0 which now has a single root at the same minimal value t¯. To construct such a matrix ∆ S˜ 0 is simple since the only condition it needs to satisfy is that M(t¯) and ∆ S˜ 0 have a common null vector. Those degrees of freedom show that the second item in assumption A is indeed generic. Now that we have established that A generically holds, we show that Eq. (8.43) is satisfied also. The proof is by contradiction. Earlier, we have shown that t¯ ≤ t∗ . Thus, if we suppose that Eq. (8.43) fails, then necessarily t¯ < t∗ . This implies that although P(t¯) is singular, the solution S˜ (t) exists for t = t¯. Our goal is to show that limt→t¯ | S˜ (t)| F = +∞, which yields the desired contradiction (by the theory of ODE’s). We first claim the following: If u 6= 0 and P(t¯)u = 0, then Q(t¯)u 6= 0.

(8.47)

Indeed, if this were not the case, then there would exist some vector u¯ 6= 0 such that P(t¯)u¯ = 0 and Q(t¯)u¯ = 0. On the other hand, P(t) and Q(t) are components of the matrix product 

P(t) Q(t)



= etH



 In , S˜ 0

¯ and where H is defined in Eq. (8.41). Multiplying the latter in t = t¯ by u, using the previous expression, it follows from the invertibility of et¯H that u¯ = 0, a contradiction. This establishes Eq. (8.47). In the previous section, we factored P(t) as P(t) = ∆(t) M(t). Since P(t) is non-singular on [0, t¯), and singular at t¯, it follows from Eq. (8.46) and the definition of ∆(t), that M(t) is non-singular (and, in fact, positive definite as shown in the previous section) on (0, t¯), and singular at t¯ as well. Therefore, since M(t) is symmetric and real-analytic, it follows from Kato (1995) that we can find a positive and real-analytic scalar function (t), and 198

Continuous time transpose model

a real-analytic unit vector u(t) such that: M(t)u(t) = (t)u(t), (t) > 0 on (0, t¯), (t¯) = 0, |u(t)|2 = 1, where |.|2 denotes the Euclidean norm. In particular, M(t¯)u(t¯) = 0, and since ∆(t¯) is non-singular, it follows that P(t¯)u(t¯) = 0. Then Eq. (8.47) implies that Q(t¯)u(t¯) 6= 0. Define the real-analytic unit vector v(t) =

∆(t)u(t) , t ∈ (0, t¯), |∆(t)u(t)|2

and calculate lim | S˜ (t)v(t)|2 = lim | Q(t) P−1 (t)v(t)|2 t→t¯

t→t¯

=

1 | Q(t¯)u(t¯)|2 lim = +∞. |∆(t¯)u(t¯)|2 t→t¯ (t)

Since for any real n × n matrix A, and for any unit vector x (i.e. | x|2 = 1) holds that | Ax|2 ≤ | A| F , it follows that limt→t¯ | S˜ (t)| F = +∞. This yields the sought-after contradiction. By combining Proposition 8.14 and the results in this subsection, we have proved the main result concerning the generic emergence of balance for solutions of system Eq. (8.30). Theorem 8.15. There exists a dense set of initial conditions X0 in Rn×n such that

the corresponding solution X (t) of Eq. (8.30) satisfies: lim t→t¯

X (t) ww> = . | X (t)| F |ww> | F

with w = et¯A0 V∆−1 (t¯)u. Proof. The set of initial conditions X0 for which A0 6= 0 and assumption A holds is dense in Rn×n . Summarizing, the model X˙ = X 2 does not lead to social balance generically, whereas the model X˙ = XX> does. The difference between the two models can be understood in terms of gossiping: the transpose model assumes that people who wish to revise their opinion about someone talk to that person about everybody else, while the earlier model assumed that people talk about that person to everybody else. Given that social balance 199

8

Models of social balance

often holds to some degree, it is more likely that people change their opinions of each other based on the model X˙ = XX> then on X˙ = X 2 .

200

9 W

Evolution of cooperation

will now discuss a subject that perhaps seems remote: the evolution of cooperation (Axelrod, 1984; Nowak, 2006a). Although the subject is not commonly considered when talking about negative links, the two are naturally related. A positive link indicates people are cooperating, while a negative link indicates people are not cooperating with each other. We will first introduce the general subject, which is usually studied through the so-called prisoner’s dilemma or variants thereof. As we will see, it is usually better to defect (i.e. not cooperate), and evolution tends to favour defection. The biggest question in this subject therefore is: why do we so frequently then observe cooperation? In other words, under what conditions can we expect cooperative behaviour to evolve? We will first briefly discuss two types of answers to this question. The first concerns repeated interaction and is known as “direct reciprocity” (Axelrod, 1984). The latter concerns reputation and the transfer of information, known as “indirect reciprocity” (Nowak and Sigmund, 2005). Finally, we will consider what this has to do with negative links, and how this involves the previously discussed models of social balance.

9.1

E

Game theory The history of the evolution of cooperation is a long and tumultuous one, and cooperation already posed problems for Darwin: if defection allows individuals to obtain a higher fitness, then why do we observe cooperation? Although Darwin himself did try to explain the situation, especially concerning the cooperative behaviour of insects, it was not until around the second world war that the problem was formalised. In 1944 Von Neumann and Morgenstern published the “Theory of Games and Economic behaviour” which was the first push towards the formalisation of the evolution of cooperation (Von Neumann and Morgenstern,

9

Evolution of cooperation

2007). They studied various games, in which parties could take independent decisions, each with a different payoff, and the focus was on determining the optimal decision (those which maximised the payoff). The famous contribution of John Nash was that he proved that for each game (with a finite set of decision) such an optimal strategy exists (Nash, 1953). Such an optimal strategy means that knowing the opponents strategy, you choose the “best response”. If both strategies are the best response to each other, such a pair is called a Nash equilibrium nowadays in his honour. Another type of optimality condition however, is that of a Pareto optimum. In such an “optimal condition” no player can increase his payoff without making another player worse off. The two conditions of optimality do not necessarily agree however, which then might results in a paradox. Although no player would individually choose a different strategy, every player might be better off with an alternative strategy. One of these specific games has become quite famous over the years, and is known as the prisoner’s dilemma. Originally, the story goes as follows. Two suspects have been apprehended by the police after a robbery, say Jack and Harry. However, the police has some difficulty in proving the involvement of the two suspects, and if both prisoners don’t talk, they can only convict them of a minor crime with a sentence of only one year. However, the police tries to get a more severe conviction, and if one of the prisoners rats out the other one, they will be able to get a conviction of 5 years for the other one. The police decide to proposes the following deal to both prisoners: “If you talk, we will reduce your sentence by one year.” Hence, if Jack betrays Harry while Harry doesn’t, Jack will get off with no jail time, while Harry will have to do 5 years in prison. On the other hand, if Jack also betrays Harry, then Harry can better betray Jack as well, since he will then only serve 4 years instead of 5. So, in this case, for both Harry and Jack individually it is better to betray each other (betrayal is a Nash equilibrium). On the other hand, it is obvious that the best situation for both is that they do not betray each other (remaining silent is a Pareto optimum). Although these conditions of optimality provide an interesting qualification of the quality of a certain strategy, the focus here is on the evolution of a certain behaviour (Maynard Smith, 1982). The study in this context was first put forward by Maynard Smith and Price (1973), although a similar concept was also considered in another form by Hamilton (1967). Their concept of an Evolutionary Stable Strategy (ESS) is actually very similar to that of a Nash equilibrium. Furthermore, it is natural to specify some 202

Game theory

evolutionary dynamics, in order to state whether some specific strategy is evolutionary stable: these are simply the fixed points of the evolutionary dynamics. We will now formalize these issues here, and briefly review some of the concepts. We will restrict ourselves to symmetrical two player games. Furthermore, there is a distinction between a finite population and an infinite population. The first is usually modelled using discrete time and are inherently stochastic in nature, while the latter gives rise to deterministic differential equations. However, the differential equations arise as a limit of large population size for some of the finite population models. First, we define the set S = {1, . . . , q} of the different possible options. Player 1 and 2 may each choose an option i ∈ S and j ∈ S. The payoff for player 1 is then Ai j while for player 2 the payoff is A ji . We allow both players to choose option i with a probability xi , and call this vector x the strategy of the player, for which ∑ xi = 1. We call x a pure strategy if xi = 1 for some i (so that only choice i is used), and a mixed strategy otherwise (Hofbauer and Sigmund, 1998).

pure strategy mixed strategy

Definition 9.1. Let x be a strategy and A the payoff matrix. Then x is called a

Nash equilibrium if

Nash equilibrium

>

>

y Ax ≤ x Ax for all y 6= x. If this inequality is strict, we call x a strict Nash equilibrium. The idea behind this definition is that no player using strategy x will have an incentive to change to any other strategy y. This can be seen as follows. The payoff when option i is chosen versus option j is Ai j . Since option i is chosen with probability yi by strategy y and option j is chosen with probability x j by strategy x, the sum ∑i j yi Ai j x j = y> Ax is the expected payoff when a strategy y plays against a strategy x. Hence, if both players use strategy x, neither player can improve its payoff by switching to a strategy y 6= x. In this sense, x is said to be a best reply to itself, since if somebody plays strategy x, one should also play strategy x. As we said earlier, the related concept of an Evolutionary Stable Strategy (ESS) was developed by biologists relatively independently of the Nash equilibrium (and some 20 years later). This can be formalized in a similar way as the Nash equilibrium.

expected payoff

Definition 9.2. Let A be the payoff matrix. A strategy x is called an evolutionary

stable strategy (ESS) if for some y 6= x

ESS

1. y> Ax ≤ x> Ax, or

203

9

Evolution of cooperation

2. if y> Ax = x> Ax then y> Ay < x> Ay.

The motivation for ESS is the following. Let x and y be two strategies. Suppose that we consider a third strategy that consists of the convex combination of the two strategies z = x + (1 − ) y. The idea is then that moving a bit from strategy x in the direction towards y should not increase the payoff. Hence y> Az < x> Az which after rewriting gives

(1 − )( x> Ax − y> Ax) + ( x> Ay − y> Ay) > 0 which yields the stated inequalities. The first condition simply states that the strategy should be a Nash equilibrium, while the second condition states that if another strategy y is equally well against x, then it should be less well against itself than x against y. Obviously, if a strategy is a strict Nash equilibrium, it is ESS, which in turn implies that the strategy is a (weak) Nash equilibrium. For our small example of the prisoner’s dilemma, we thus have the following payoff matrix

C A=− D



C

D

1 0

5 4

 ,

where cooperation (denoted by C) here means to keep silent, and defection (denoted by D) means to betray the other and talk to the police. The payoffs here are negative since they correspond to years in jail, something most people presumably like to avoid. Defecting corresponds to the pure strategy x = (0, 1), with payoff x> Ax = −4. For any other strategy y = ( p, 1 − p) we obtain y> Ax = −5p − (1 − p)4 < −4 = x> Ax, so that indeed defecting is a strict Nash equilibrium, hence also an evolutionary stable strategy. Nonetheless, the strategy y = (1, 0) has payoff y> Ay = −1 > −4 = x> Ax, and so y is preferable for both players. 204

Game theory

Initial population

g Evolution

Low payoff High payoff

Fig. 9.1

Final population

g +1 Evolution

Interaction

Evolution

Interaction

Schematic of the evolutionary dynamics

9.1.1 Finite population size The basic idea of evolution is that of reproduction and fitness dependent selection. Hence, agents that have a higher fitness, and are more likely to reproduce (or less likely to die), as illustrated in Fig. 9.1. There are various possible scenarios here, and we will discuss only a few of them, most notably the Moran process (Nowak, Sasaki, Taylor et al., 2004), the pairwise comparison (Traulsen, Nowak and Pacheco, 2006) (sometimes also known as the Fermi process) and the Wright-Fisher process (Imhof and Nowak, 2006). Let us assume there are n agents, and that each agent is of some type Ti ∈ S. We denote by ns = |{ Ti = s}| the number of agents that are of type s, and of course ∑s ns = n. We denote the vector of ns by ~n. We assume each agent is interacting randomly with some other agents, and that no specific population structure is present. We therefore assume that the fitness for each agent of the same type is equal, and we denote the fitness for an agent of type s by f s (~n), which may depend on the number of agents of some specific type.

f s (~n) fitness

Moran process The Moran Process is very simple: we select an agent for reproduction with some probability proportional to their fitness (Nowak, Sasaki, Taylor et al., 2004). So, the probability that some agent of type s reproduces is given by φs =

ns f s (~n) nh f i

(9.1)

where h f i = n1 ∑s ns f s is the average fitness of the population. We then randomly choose another agent to die, which will be replaced by the off205

Moran Process

φs reproduction probability

9

Evolution of cooperation

spring from the agent chosen for reproduction. This probability is denoted by ωs = nns . We denote accordingly by ns ( g) the number of agents of type s in generation g. The difference between two generations can then be denoted by ∆ns ( g) = ns ( g + 1) − ns ( g). The update rules introduced above can then be written explicitly as Pr(∆ns ( g) = −1) = (1 − φs )ωs ,

Pr(∆ns ( g) = 0) = φsωs + (1 − φs )(1 − ωs ), Pr(∆ns ( g) = 1) = φs (1 − ωs ).

(9.2a) (9.2b) (9.2c)

For randomly mixing populations, the order of reproduction and dying has no effect, but for structured populations it does. We will not discuss this here.

Pairwise comparison

pairwise comparison

Another possibility instead of selecting one agent for reproduction and another one for death, is to compare the relative fitness between two agents, and let them compete to “take over” the other one’s spot, so to speak. One of the advantages is that we don’t need to know the fitness of all agents, but only of the two agents (Traulsen, Nowak and Pacheco, 2006; Traulsen, Claussen and Hauert, 2005). These dynamics are known as the pairwise comparison process (also the Fermi process). If we compare an agent of type r to type s, the probability that an agent of type r replaces an agent of type s is then given by φrs =

β intensity of selection

1 . 1 + e−β( fr (~n)− f s (~n))

(9.3)

The parameter β corresponds to a certain intensity of selection. For high β it is almost sure that if r has a higher fitness than s that he will “win” the competition and φrs → 1 for β → ∞ if f r (~n) > f s (~n). For low β on the other hand, almost all types will have the same probability to reproduce, independently of their fitness, and that φrs → 1/2 for β → 0. Notice that in general φsr = 1 − φrs . The number of agents of a certain type can only 206

Game theory

be augmented by 1, and we obtain the following expressions Pr(∆ns ( g) = −1) =

ns ( g) nr ( g ) φrs , ∑ n r6=s n

n2s ( g) , n nr ( g ) ns ( g) φsr . Pr(∆ns ( g) = 1) = n r∑ n 6=s

Pr(∆ns ( g) = 0) =

(9.4a) (9.4b) (9.4c)

Wright-Fisher process Whereas the previous models only modelled the reproduction and death of a single agent, in the Wright-Fisher process the whole population evolves simultaneously (Imhof and Nowak, 2006). In this process one “evolutionary step” consists of randomly sampling n agents from the old population based on their fitness, to form the new population. Hence φs =

ns f s (~n) nh f i

(9.5)

similar to the Moran process. However, now instead of selecting a single agent, we select n agents. Hence, the probability that there are ns agents of type s in the next generation is Pr(ns ( g + 1) = ns ) =

  ns φns s (1 − φs )n−ns n

(9.6)

and the expected number of agents of type s is hns ( g + 1)i = nφs . Hence, a higher fitness f s (~n) leads to a higher φs , which in turn leads to a higher expected number of agents in the next generation. 9.1.2 Fixation probability for 2 × 2 games Let us now focus on 2 × 2 games, where we assume there are two types of players, A players and B players. This corresponds to a payoff matrix with

A A= B



A

B

a c

b d

 .

(9.7)

Strategy A, corresponding to the pure strategy x = (1, 0) is then a Nash 207

Wright-Fisher

9

Evolution of cooperation

equilibrium if a ≥ c (and strictly Nash if the inequality is strict) and similarly strategy B is a Nash equilibrium if d ≥ b. Strategy A is an ESS if a > c or if a = c then b > d.

fixation probability

We are interested in the probability that A players (or B players) will take over the whole population starting from n0 A players (or B players). This quantity is known as the fixation probability ρ A (n0 ) (or ρ B (n0 ) for B players) (Nowak, Sasaki, Taylor et al., 2004). We will focus on the Moran process and the pairwise comparison, which behave rather similar. It can be seen that this amounts to a sort of biased random walk on the number of A players (or B players). Let us denote the number of A players by i, and denote the transition probabilities as follows Pr(∆n A = −1|i ) = λi− Pr(∆n A = 0|i ) =

Pr(∆n A = +1|i ) =

λi0 λi+ .

(9.8a) (9.8b) (9.8c)

Clearly λi− + λi0 + λi+ = 1, and so we can also write λi0 = 1 − λi− − λi+ . Obviously, λ00 = λn0 = 1 and the states i = 0 and i = n are absorbing. We are then interested in the probability to reach state n (all A players) starting from state i = n0 , which we will denote by ρi = ρ A (i ). The probability ρi to reach state n from state i is the probability ρi−1 to reach it from state i − 1 times the probability to go from state i to state i − 1, etc. . . , and we arrive at the recursion ρi = λi− ρi−1 + λi0 ρi + λi+ ρi+1 ,

(9.9)

In addition, we have that ρ0 = 0, because it is an absorbing state, and we can never reach state n from i = 0 and that ρn = 1 since we have already reached it. Let us introduce a new variable yi = ρi − ρi−1 . Then yi +1 = ρi +1 − ρi

= ρi+1 − λi− ρi−1 − (1 − λi− − λi+ )ρi − λi+ ρi+1

= (1 − λi+ )(ρi+1 − ρi ) + λi− (ρi − ρi−1 )

= (1 − λi+ ) yi+1 + λi− yi , 208

Game theory

and hence yi+1 =

λi− y. λi+ i

Since ρ0 = 0 we have y1 = ρ1 and we obtain i

λ−

k=1

k

yi = ρ 1

∏ λk+ .

j

Furthermore, ∑i=1 yi = ρ j − ρ0 = ρ j , and specifically, ∑i yi = ρn − ρ0 = 1 so that 1 . ρ1 = λ− j n−1 1 + ∑ j=1 ∏k=1 λk+ k

Moreover, ρi = ρ 1

1+

j

i −1

1 1 + ∑ij− =1

j

ρ A = ρ1 =

k

λ− j ∏k=1 λk+ k

1 + ∑nj=−11 ∏k=1

we thus obtain

!

∑ ∏ λ+

j=1 k=1

=

λk−

λk− λk+

.

(9.10)

1 1 + ∑in=−11 ∏ik=1

λk− λk+

(9.11)

Moreover, the ratio between ρ A = ρ1 and ρ B = 1 − ρn−1 becomes simply n−1 λ − ρA = ∏ i+ ρB i =1 λi

(9.12)

If this fraction is larger then 1 and ρ A > ρ B then type A is said to be risk dominant. If λk− = λk+ for all k, then the fixation probabilities simplify to ρi = ni . Hence, if the fitness for both species is always equal, the fixation probability is simply ρi = ni , and we refer to this as the neutral fixation probability. If a species has a higher fixation probability than neutral it has an evolutionary advantage and if it is lower an evolutionary disadvantage. In general, whether fixation probabilities are larger then neutral, or whether a strategy is risk dominant does not depend on the intensity of 209

risk dominant

neutral selection

evolutionary advantage

9

Evolution of cooperation

selection. We denote by i

Fi (β) =

λk−

∏ λ+

k=1

k

where β represent the intensity of selection. If the intensity of selection β = 0, we expect any evolutionary process to be neutral (since otherwise there would effectively be selection). Hence, we obtain that for β = 0 that 1 1 = n 1 + ∑i Fi (β)

ρA = Taylor series

so that 1 + ∑i Fi (β) = n. Then for small β using a Taylor expansion to be evolutionary advantageous ρ A > 1/n comes down to n < 1 + ∑ Fi (β) ≈ 1 + ∑ Fi (0) + β ∑ Fi0 (0) = n + β ∑ Fi0 (0) i

i

i

i

so that effectively if ∑i Fi0 (0) < 0 then ρ A > 1/n. Hence, to be evolutionary advantageous is independent of the intensity of selection. Similarly for risk dominance, we obtain that Fn−1 (0) = 1 so that strategy A is risk dominant if F 0 (0) > 0 for small β. Hence, in general, these properties do not depend on the intensity of selection. This neutral fixation probability is also valid for the Wright-Fisher process. However, the analysis of the fixation probability is more complex for the Wright-Fisher process, and we will not include it here (Sella and Hirsh, 2005; Imhof and Nowak, 2006). Moran process linear Moran payoff

For the Moran process it is customary (Nowak, Sasaki, Taylor et al., 2004) to specify the fitness as f A (~n) = 1 − β + βFA (~n), f B (~n) = 1 − β + βFB (~n),

(9.13a) (9.13b)

where β represents the intensity of selection and FA (~n) and FB (~n) are the payoffs for type A and B, which for the matrix given in Eq. (9.7) gives nB nA − 1 a+ b, n−1 n−1 nA n −1 FB (~n) = c+ B d. n−1 n−1

FA (~n) =

210

Game theory

The transition probabilities λi± are then

( n − i ) f B (i ) i n B f B (~n) n A = nh f i n i f A (i ) + ( n − i ) f B (i ) n n f (~n) n B i f A (i ) n−i = A A = nh f i n i f A (i ) + ( n − i ) f B (i ) n

λi− = λi+

and the ratio becomes

λi− λi+

=

f B (i ) . f A (i )

(9.14)

Now for general β it is difficult to analyse the product ∏in=−11

λi− . λi+

In the limit

of “weak selection” however, i.e. as β → 0, the analysis becomes tractable. In that case, we obtain by a simple Taylor approximation λi− λi+

f (i )

≈ 1+β

∂ f B (i ) A

∂β

= 1 − β( FA (i) − FB (i)).

By ignoring contributions β2 (because β → 0) in the product, we obtain n−1

λi−

i =1

λi+



≈ 1−β

n−1

∑ ( FA (i) − FB (i)).

(9.15)

i =1

The difference FA (i ) − FB (i ) can be written as FA (i ) − FB (i ) =

1 (αi + ω) n−1

(9.16)

where α = ( a − b) − (c − d) and ω = n(b − d) + d − a. In that case, the sum in Eq. (9.15) is relatively straightforward to calculate, and we obtain k

k

1

k

∑ ( FA (i) − FB (i)) = ω n − 1 + n − 1 ∑ αi

i =1

i =1

k k(k + 1) =ω +α n−1 2(n − 1)

(9.17)

The ratio between the fixation probabilities is then n−1 λ − ρA n = ∏ i+ ≈= 1 − β(ω + α ). ρB 2 λ i =1 i

(9.18)

211

9

Evolution of cooperation

Hence, if ω + α n2 > 0 then a single A mutant has a higher probability of fixation as a single B mutant, and type A is risk dominant, which is the case if a(n − 2) + bn > d(n − 2) + cn (9.19) which for large n becomes approximately a + b > d + c. The fixation probability ρ A itself is, from Eq. (9.11), ρA =

1 −1 k 1 + ∑kn= 1 ∏i =1

λi− λi+

.

(9.20)

The product is λi−

k

 ≈ 1−β ω

∏ λ+

i =1

i

k (k + 1)k +α n−1 2(n − 1)

 (9.21)

and so the sum is n−1 k

λi−

∑ ∏ λ+

k=1 i =1

i



n−1 



k=1

 1−β ω

(k + 1)k k +α n−1 2(n − 1)



n(n − 1)βω βα (n − 1)n(n + 1) − 2(n − 1) 2(n − 1) 3 nβω n(n + 1) = (n − 1) − − βα . 2 6

= (n − 1) −

The fixation probability thus becomes 1

ρA ≈

1 + (n − 1) − nβω 2 − 1 1 = n 1 − βω − βα (n+1) 2

βαn(n+1) 6

(9.22) (9.23)

6

Now we are interested in knowing when the fixation probability ρ A > 1/n is greater than neutral. This leads to 3ω + α (n + 1) > 0, and so whether the fixation probability is larger than neutral is independent of the intensity of selection. For large n this amounts to 2b + a > 2d + c

212

(9.24)

Game theory

Pairwise comparison The ratio between the transition probabilities λi± takes a much simpler, more elegant form for the pairwise comparison. From Eq. (9.3) we obtain i n−i 1 n n 1 + exp(−β( f A − f B )) i n−i 1 = . n n 1 + exp(β( f A − f B ))

λi− = λi+

The ratio between the transition probabilities therefore becomes λi− λi+

= e−β( f A − f B ) .

(9.25)

For the pairwise comparison, we usually take as fitness simply the payoff, so that f A = FA and f B = FB . The product of the ratio’s is also quite simple λi−

k

∏ λ+

i =1

i

k

!

= exp −β ∑ ( f A − f B ) ,

(9.26)

i =1

and this holds not only for weak selection, but for all intensities of selection. We have already calculated this sum earlier in Eq. (9.17), and so we obtain   k λ− k k(k + 1) i ∏ + = exp −βω n − 1 + α 2(n − 1) . i =1 λi Notice that for weak selection β → 0 we obtain the exact same results since e−β∆F ≈ 1 − β∆F. The ratio between ρ A and ρ B is therefore h  ρA n i = exp −β ω + α , ρB 2 and type A is risk dominant whenever ω + α n2 > 0, resulting in the same inequality as for the Moran process in Eq. (9.19). However, the result is valid for all intensities of selection for the pairwise comparison, and whether a strategy is risk dominant is independent of the intensity of selection. The actual fixation probability ρ A is ρA =

1 −1 1 + ∑kn= 1



k(k+1)

k exp −βω n− 1 + α 2(n−1)

.

(9.27)

213

Pairwise fitness

9

exponential Moran fitness

Evolution of cooperation

For large n we can approximate the sum by an integral, while for weak selection β → 0 we arrive at the same result as for the Moran process. Notice that for the Moran process, we can also take as fitness f A (~n) = eβFA (~n) , βFB (~n)

f B (~n) = e

,

(9.28a) (9.28b)

with β again the intensity of selection. In that case the transition probabilities λi± are λi− = λi+ =

(n − i)eβFA (~n) i , βF (~ n ) βF (~ n ) B A n (n − i )e + ie

n−i ieβFA (~n) . + ieβFB (~n) n

(n − i)eβFA (~n)

Notice that although this is different to the pairwise comparison process, the ratio between the transition probabilities is also λi− λi+

= e−β( FA (~n)− FB (~n)) .

(9.29)

Hence, using Eq. (9.28) instead of Eq. (9.13) as fitness, the Moran process and the pairwise comparison process are equivalent (Traulsen, Shoresh and Nowak, 2008) as far as the fixation probability is concerned. This is surprising since we needed information about all agents for the Moran process, while for the pairwise comparison, we only used local information, yet the two behave similarly. 9.1.3 Infinite population size When the population size goes to infinity, the changes are essentially continuous, and we denote by xs = nns the relatively frequency of type s and by x the vector of x = ( x1 , x2 , . . . , xq ). The fitness of type s is f s ( x) similar as before, while the average fitness is h f i. Let us assume that all agents reproduces at some same basic rate α and die at some rate β, and that these rates are proportional to the number of agents (corresponding to basic exponential growth). In addition, the reproduction of some type s is based on its fitness f s ( x). Furthermore, let us assume that the rate of reproduction is proportional to some time interval ∆t. Then the number of agents at time 214

Game theory

t + ∆t ns (t + ∆t) = ∆t(α + f s ( x) − β)ns (t) + ns (t), and so by taking the limit ∆t → 0 we obtain that lim

∆t→0

ns (t + ∆t) − ns (t) = n˙ s = (α + f s ( x) − β)ns . ∆t

(9.30)

Since ns (t) = xs (t)n(t), we have that n˙ s = x˙ s n + xs n˙ so that ˙ x˙ s n = n˙ s − xs n.

(9.31)

Now since n = ∑s ns we simply have that n˙ =

∑ n˙ s s

= ∑(α + f s ( x) − β)ns s

= (α + h f i − β)n.

(9.32)

Then plugging Eq. (9.32) and Eq. (9.30) into Eq. (9.31) we obtain x˙ s n = (α − β)(ns − xs n) + f s ( x)ns − h f i xs n so dividing by n we arrive at x˙ s = ( f s ( x) − h f i) xs .

(9.33)

This equation is known as the replicator equation (Hofbauer and Sigmund, 1998). In the case of game theory, we assume that each type s will play a certain (mixed) strategy ps . The average strategy is then p( x) = ∑s xs ps , so that the average payoff for type s is f s ( x) = p>s Ap, while the average payoff is then h f i = p> Ap, so that the replicator equation becomes x˙ s = ( p>s Ap( x) − p> ( x) Ap( x)) xs .

(9.34)

If we assume each type corresponds to a pure strategy, this simplifies further. For simplicity, we can assume that A is then a q × q matrix, and that each choice coincides with a type. Hence, the strategy ps = es (where es = δsi is the standard basis vector), and a type s always plays choice s. In that case, the average strategy is simply p( x) = x. Hence, we then arrive 215

replicator equation

9

Evolution of cooperation

at x˙ s = (e>s Ax − x> Ax) xs .

(9.35)

Now there exists a certain correspondence between Nash equilibria, evolutionary stable strategies (ESS) and the stability of rest points of this replicator equation. In this case the population state x is used as the mixed strategy in the definition of a Nash equilibrium. Then the following can be proven (Hofbauer and Sigmund, 1998). Theorem 9.3. In the following, statements of dynamical systems refer to Eq. (9.35).

1. If x is Nash, then x is a fixed point. 2. If x is strictly Nash, then x is asymptotically stable. 3. If x is a stable fixed point, then x is Nash 4. If x is ESS, then x is asymptotically stable 5. If x is ESS and in interior, then x is globally attracting. We can also explicitly analyse how the finite population size models behave for large n to see how the finite and infinite population models are connected (Traulsen, Claussen and Hauert, 2005; Traulsen, Nowak and Pacheco, 2006). In order to develop this derivation, it is easiest to take the Moran process and pairwise comparison for the 2 × 2 case, so that we again only have A and B players. In that case the replicator equation reduces to x˙ = x(1 − x)( f A ( x) − f B ( x)),

(9.36)

where x = x A and 1 − x = x B . Let us denote by P(i, τ ) the probability there are i A players at time τ, which then respects the recursion P(i, τ + 1) = P(i, τ ) + P(i − 1, τ )λi+−1 +

P(i + 1, τ )λi++1 − P(i, τ )(λi+ + λi− ).

(9.37)

We will now see how this probability distribution P(i, τ ) changes for large n. In order to do so, we need to introduce a few equivalents. We rescale time as t = τn and denote by x = ni the fraction of A players. The probability there are i A players then becomes nP(i, τ ) = ρ( x, t), while the transition probabilities become simply λi± = λ ± ( x). From Eq. (9.37) we 216

Game theory

then obtain ρ( x, t + 1/n) − ρ( x, t) = ρ( x − 1/n, t)λ + ( x − 1/n)+

ρ( x + 1/n, t)λ − ( x + 1/n) − ρ( x, t)(λ + ( x) + λ − ( x)).

(9.38)

For approximating the quantities ρ( x, t + 1/n), ρ( x ± 1/n, t) and λ ∓ ( x ± 1/n) we will use a Taylor expansion. We then arrive at 1 ∂ρ( x, t) n ∂t 1 ∂ρ( x, t) 1 ∂2 ρ( x, t) ρ( x ± 1/n, t) = ρ( x, t) ± + 2 n ∂x 2n ∂x2 2 ∓ 1 ∂λ ( x) 1 ∂ λ ∓ ( x) λ ∓ ( x ± 1/n) = ρ( x, t) ± + 2 n ∂x 2n ∂x2 ρ( x, t + 1/n) = ρ( x, t) +

Plugging these approximations into Eq. (9.38) and collecting terms proportional to 1/n gives 1 ρ( x, t) + ∂λ + ( x) − λ ( x) − ρ( x, t) + n ∂x ∂x ∂λ − ( x) ∂ρ( x, t) − + λ ( x) ρ( x, t) ∂x ∂x

=−

!

1 ∂ ρ( x, t)(λ + ( x) − λ − ( x)) n ∂x

Similarly collecting terms for 1/n2 gives 1 ∂2 ρ( x, t)(λ + ( x) + λ − ( x)) 2n2 ∂x2 so that we finally arrive at ∂ρ( x, t) ∂ = − ρ( x, t)(λ + ( x) − λ − ( x))+ ∂t ∂x 1 ∂2 (λ + ( x) + λ − ( x)) ρ ( x, t ) 2 ∂x2 n

(9.39)

which is the Fokker-Planck equation. It describes the dynamics of the probability distribution ρ( x, t) throughout time. The first term is usually called

217

Fokker-Planck

9

Evolution of cooperation

the drift term (indicating directionality) and the second term the diffusion term (indicating a random diffusion in all directions). Now letting n → ∞, we obtain ∂ρ( x, t) ∂ = − ρ( x, t)(λ + ( x) − λ − ( x)). (9.40) ∂t ∂x δ Dirac delta

We use as initial condition ρ( x, t) = δ ( x − x0 ) the Dirac deltafunction, so there the initial relatively frequency of type A players is x0 and there is no uncertainty with respect to the initial condition. Indeed then ρ( x, t) = δ ( x − x(t)) for all time t. By definition of the Dirac delta function we obtain R R xρ( x, t)dx = xδ ( x − x(t))dx = x(t) so that ∂x(t) = ∂t

Z 1 ∂ρ( x, t)

dx ∂t Z 1 ∂ =− x δ ( x − x(t))(λ + ( x) − λ − ( x))dx ∂x 0 0

x

(9.41) (9.42)

and by partial integration we obtain that x˙ = λ + ( x) − λ − ( x).

(9.43)

Working out λ ± ( x) for the Moran process yields f B ( x) x f A ( x) + (1 − x) f B ( x) f A ( x) λ + ( x) = x(1 − x) x f A ( x) + (1 − x) f B ( x) λ − ( x) = x(1 − x)

with finesses indicated as in Eq. (9.13) this leads to x˙ =

1 β

x(1 − x)( FA ( x) − FB ( x)) − 1 + xFA ( x) + (1 − x) FB ( x)

(9.44)

which yields an adjusted replicator equation with fitness equal to payoff (Traulsen, Claussen and Hauert, 2005). For the pairwise comparison, working out yields λ + ( x) − λ − ( x) = x(1 − x)

218

exp β( FA − FB ) − 1 , exp β( FA − FB ) + 1

Game theory

which is the definition of the tangent hyperbolic, resulting in  x˙ = x(1 − x) tanh

 β ( FA − FB ) . 2

(9.45)

For small β this reduces to exactly the replicator equation when taking the first order Taylor expansion, with fitnesses equal to payoff (Traulsen, Nowak and Pacheco, 2006). The first order approximation of the tangent hyperbolic function yields tanh β/2∆ = β/2∆ so that we arrive at x˙ =

β x(1 − x) ( FA − FB ) , 2

which is exactly the replicator for a rescaled time t0 = tβ/2. Hence, the replicator equation is consistent with the finite population models. Moreover, for 2 × 2 games a strategy is risk dominant if x∗ < 1/2, while is has an evolutionary advantage (ρ A > 1/n) if x∗ < 1/3 (Nowak, Sasaki, Taylor et al., 2004).

9.1.4 Prisoner’s dilemma Let us briefly look at the prisoner’s dilemma, which corresponds to a payoff matrix with C D   C R S A= . (9.46) D T P The prisoner’s dilemma corresponds to T > R > P > S. Here R (reward) corresponds to the payoff when both agents cooperate, while if the one agents defects and the other cooperates he receives T (temptation) and the other receives S (sucker), while if both defect, both get a payoff of P (punishment). For our earlier example we had R = −1, T = 0, S = −5 and P = −4. Let us start by looking at the Nash equilibrium and the ESS. Clearly, the strategy x = (0, 1) (always defect) is a (strict) Nash equilibrium, which can be easily seen from x> Ax = (0, 1)



R T

S P

  0 = P, 1 219

prisoner’s dilemma

9

Evolution of cooperation

while for y = ( p, 1 − p) 6= x we obtain y> Ax = ( p, 1 − p)



R T

S P

  0 = Sp + (1 − p) P, 1

and since S < P, we obtain that y> Ax < x> Ax, and hence x is a strict Nash equilibrium, hence it is also an ESS. In fact, it is also the unique Nash equilibrium (and ESS). Let y = ( p, 1 − p) be any other strategy. Then y> Ay − x> Ax = p2 ( R − T ) + p(1 − p)( S − P) < 0

AllC AllD

because T > R and P > S. Let us look at this from the viewpoint of a finite population. Assume we have n agents, of two types only: those who always cooperate (AllC) and those who always defect (AllD). Let us assume there are nC cooperators and n D defectors. The payoff for a cooperator is then FC (~n) = R

nC − 1 n +S D n−1 n−1

since if a cooperator is playing against a cooperator the payoff is R and against a defector it is S. For a defector the payoff is then FD (~n) = T

nC n −1 +P D . n−1 n−1

The difference in payoff is then FC (~n) − FD (~n) =

nC ( R − T )+ n−1

nD 1 ( S − P) + ( P − R), n−1 n−1

which is always negative because T > R > P > S, and so FC (~n) < FD (~n), consistent with the Nash equilibrium. We hence expect defectors to generally win. The average payoff is then

h F i = FD (~n)

nd nc + FC (~n) . n n

Let us analyse the fixation probability ρC of a single cooperator mutant in a population of defectors. Let us first focus on the ratio ρC /ρ D to investigate which of the strategies is risk dominant. By Eq. (9.19) cooperators are 220

Game theory

risk dominant if R(n − 2) + Sn > P(n − 2) + Tn, which for large n is R + S > P + T. This is neither the case for finite population size nor for large n given that T > R > P > S. Cooperators have an evolutionary advantage whenever ρ A > 1/n which by Eq. (9.24) is the case for large n if 2S + R > 2P + T, which contradicts T > R > P > S, so that cooperators indeed never have an evolutionary advantage. The replicator equation is then x˙ = x(1 − x)( Rx + S(1 − x) − Tx − P(1 − x))

= x(1 − x)((1 − x)( S − P) + x( R − T )),

which might have a fixed point (besides x∗ = 0 and x∗ = 1) at x∗ =

P−S . R−T+P−S

Indeed, for this fixed point to exist we must have 0 < x∗ < 1, which is never the case. Hence, there are only two fixed points, only one of which is stable, namely x∗ = 0. Hence, for any initial population, the population evolves towards only defectors. An alternative specification of the prisoner’s dilemma, which is also often employed is the following. Each agent can cooperate by providing a benefit b > 0 to his partner at a cost of c < b to himself. This corresponds to the following payoff matrix C C A= D



b−c b

D  −c . 0

(9.47)

Again, only defecting is a strict Nash equilibrium and the only evolutionary stable strategy. Cooperating is risk dominant if b − 2c > b

(9.48)

which is clearly never the case. The replicator equation becomes x˙ = x(1 − x)((b − c) x − c(1 − x) − bx) = −cx(1 − x)

(9.49)

so that only only x∗ = 1 is a stable fixed point. Again, any initial popula221

b benefit c cost

9

Evolution of cooperation

Agents either Cooperate or Defect

C D

Fig. 9.2

C

D

b−c

−c

b

0

Prisoner’s dilemma

tion will evolve towards only defectors. Hence, on all accounts cooperation is never evolutionary stable or advantageous. It is quite unlikely cooperators ever successfully invade a population of defectors and even less likely to become fixated in a population of defectors. On the other hand, defectors will easily invade a population of cooperators, and are likely to become fixated in the population. In the limit of large population size the evolutionary trend is always towards the defectors. In reality however, we do observe cooperation. Hence, the question is, how can cooperation ever have evolved?

9.2

Towards cooperation Various mechanisms for explaining the evolution of cooperation have been suggested (Nowak, 2006b), such as kin selection (Maynard Smith, 1982; Hamilton, 1964), reciprocity (Axelrod, 1984) or group selection (Wilson, 1975). We will first explain briefly the concept of direct reciprocity and then introduce the concept of indirect reciprocity.

9.2.1 Direct reciprocity direct reciprocity

tit-for-tat (TFT)

Direct reciprocity—or simply reciprocity for short—is based on the idea of “you scratch my back, I scratch yours”. That is, if I help you, you should return the favour by helping me. This comes down to playing multiple rounds of the prisoner’s dilemma. This is also known as the iterated prisoner’s dilemma (IPD). There is a plethora of different strategies to play an IPD, but the one strategy that performs outstanding versus a wide array of different strategies is tit-for-tat (TFT), which embodies the principle of direct reciprocity (Axelrod, 1984). 222

Towards cooperation

Tit-for-tat simply does exactly what its opponent does and starts out cooperating on the first round. For example, if TFT plays against AllD (a player who defects on every round), TFT will cooperate on the first round, but will subsequently defect, because AllD defects. In this context it is also commonly demanded that R > ( T + P)/2 so that cooperation has a higher reward than alternating between defecting and cooperating. Notice that for the specification using benefits b and costs c in Eq. (9.47) this is always the case. Let us use this specification to look how TFT evolves against AllD. First we have to decide how many rounds k of the prisoner’s dilemma there will be played. This is not exactly trivial. We know that for a single round only defecting is stable. So, if we know how many rounds there will be, it should be better to defect on the last round. But then the second to last round can be considered as the last round, and working our way back in that way, it should be better to always defect again. Hence, it is usually supposed that there is a certain probability w to have another round. This is sometimes poetically called “the shadow of the future”. The number of rounds then follows a geometric probability distribution, with an expected number of rounds of hki = 1/(1 − w). If a TFT player meets another TFT player, they continue to cooperate, since they start out cooperatively and then do what the other ones does (i.e. cooperate), and so both receive an expected payoff of hki(b − c). If a TFT player plays against AllD, the TFT player will receive once a payoff of −c after which he will also always defect, while the AllD player will then receive once a payoff of b. Two AllD players will never receive any payoff. The expected payoffs for TFT versus AllD is then as follows

TFT A= AllD



TFT

AllD

hki(b − c) b

−c 0

AllD

expected payoff

 .

(9.50)

Analysing when TFT is a strict Nash equilibrium, we arrive at 1 b > c w

(9.51)

Hence, if the probability to continue another round is large enough, or the other way around if the benefit-cost ratio is large enough, cooperation has a chance to evolve. However, defecting will also always stay a Nash equilibrium since −c < 0. TFT is risk dominant if bc > 2−ww , for large n. If we look at the fixation probability of TFT this is larger then neutral if 223

benefit-cost ratio

9

Evolution of cooperation

b c

>

3−2w w .

One particular problem for TFT however is that in the face of errors it might end up defecting (Nowak and Sigmund, 1993). In order to analyse this let us look at what combination of cooperation and defecting two TFT players will end up. Let us denote by q = (qCC , qCD , q DC , q DD ) the probabilities to cooperate. Then qCC is the probability to cooperate after a round in which the agent himself cooperated and his opponent cooperated, qCD the probability the cooperate after a round in which the agent himself defected while his opponent defected, etc. . . . TFT then corresponds to the strategy q = (1, 0, 1, 0). Now let us look how two players with strategies q and q0 end up in what type of situations. Let us denote by M the matrix of transition probabilities for the four different states CC, CD, DC and DD, so that for example MCD,DC represent the probability to move from state CD to state DC. This transition matrix is then   0 0 0 0 qCC qCC qCC (1−qCC ) qCD (1−q0DC ) 0 DC CD q DC (1 −qCD ) 0 q DD q DD q DD (1−q0DD )

 q q0 M =  qCD q0DC

(1−qCC )qCC (1−qCD )q0DC 0 (1−q DC )qCD (1−q DD )q0DD

(1−qCC )(1−qCC ) (1−qCD )(1−q0DC )  0 ) . (1−qCD )(1−qCD (1−q DD )(1−q0DD )

(9.52)

Let us denote the probability to be in a certain state with π. The probabilities then change according to π (t + 1) = Mπ (t) = Mt π (0). We are interested in the stationary state π = limt π (t) = Mπ. If the game will be iterated long enough we will be in the stationary state and the payoff for a certain strategy q is then Fq = ∑s πs As . So, for two TFT players this becomes CC CD DC DD   CC 1 0 0 0 CD  0 1 0   0 . M=  CD 0 1 0 0  DD

0

0

0

1

From this one can observe that if somehow one of the two TFT players defects, that the two TFT players alternatively defect. They alternate then between states CD and DC, so that each take turn in defecting. In fact, let us suppose that with some probability  a TFT player defects while he didn’t intend to, which corresponds to strategy q = (1 − , 0, 1 − , 0). The 224

Towards cooperation

transition matrix is then CC CC CD   M= CD  DD 

CD

(1 − )2

DC

(1 − ) (1 − ) 0 1 − 1 − 0 0 0

0 0 0

DD  2   .   1

This transition matrix M has a single absorbing state, so that for all  > 0 two TFT players (with errors) will end up defecting at stationarity. For this reason often also another strategy is considered, which is more stable in the presence of errors, namely the Win-Stay-Loose-Shift (WSLS) strategy (Nowak and Sigmund, 1993). The idea is that whenever the agent is doing well, it will continue to make its current choice, and if it is doing not so well it will switch. Without errors this corresponds to the strategy q = (1, 0, 0, 1). This yields the transition matrix for two WSLS players CC

CD

DC

1 0 0 1

0 0 0 0

0 0 0 0

 CC CD   M= CD  DD

DD  0 1  . 1  0

This matrix has as the state CC as the single absorbing states and hence two WSLS players are expected to end up cooperating, regardless of the initial condition. Let us see how the WSLS strategy does in the face of errors. This then corresponds to the strategy q = (1 − , 0, 0, 1 − ). The corresponding transition matrix is then CC

(1 − )2

CC CD  0  M= CD  0 DD (1 − )2 

CD

DC

(1 − ) (1 − ) 0 0 0 0 (1 − ) (1 − )

DD  2 1  . 1  2

The stationary probability to cooperate is then πCC =

(1 − )2 ≈ 1 − 4 2(1 − ) + 1 225

Win-Stay-LooseShift (WSLS)

9

Evolution of cooperation

which stays near 1 for small  so that indeed the WSLS strategy stays cooperative when faced with small errors. Hence, the WSLS strategy is then quite robust with respect to these type of errors (Nowak and Sigmund, 1993). In fact, for the iterated prisoner’s dilemma with an infinite number of rounds there exists a strategy that dominates all other strategies, the so-called zero-determinant strategies (Press and Dyson, 2012). However, these zero-determinant players do not necessarily always cooperate amongst each other, and are not evolutionary stable (Hilbe, Nowak and Sigmund, 2012). For example the WSLS strategy actually obtains a better payoff, because they end up cooperating with each other (Adami and Hintze, 2012). 9.2.2 Indirect reciprocity

indirect reciprocity

Humans have a tendency however to also cooperate in contexts beyond kin, group or repeated interactions. It is believed that some form of indirect reciprocity can explain the breadth of human cooperation (Nowak and Sigmund, 2005). Whereas in direct reciprocity the favour is returned by the interaction partner, in indirect reciprocity the favour is returned by somebody else, which usually involves some reputation. It has been theorized that such a mechanism could even form the basis of morality (Alexander, 1987). Additionally, reputation (and the fear of losing reputation) seems to play in important role in maintaining social norms (Fehr and Fischbacher, 2004; Elias and Scotson, 1994; Friedkin, 2001). In indirect reciprocity often a slightly different game is played, namely that of donation (Nowak and Sigmund, 2005). Instead of that a pair interacts both ways, one agent is selected to be the donor and the other the recipient. The donor may decide to give a benefit b to the recipient at a cost of c to himself. Hence, the recipient cannot immediately return the favour. Assuming random pairing, it will take some while before the same pair is chosen again for interaction, so that this reduces the possibilities for direct reciprocity. Nonetheless, this game reduces to our earlier game. So, even though we may speak of donor and recipient from time to time, the underlying game remains the same. Usually indirect reciprocity is modelled using some form of reputation, which is often assume to be binary: agents are either good (G) or bad (B). We will consider indirect reciprocity of increasing complexity. The first order scheme is only based on the action of the donor: cooperate or defect. The second order scheme takes into account the reputation of the recipient. 226

Towards cooperation

Action of donor

Reputation of recipient

G B C G G D B B C D

Fig. 9.3

New reputation Action

First order indirect reciprocity

For example, it might be good to defect against a bad agent whereas this would be bad against a good agent. The third order scheme also takes into account the reputation of the donor. After all, perhaps agents should only care about their own reputation, not about the reputation of others. First order In the simplest framework, the first order scheme, we assume that agents cooperate with “good” agents and defect with “bad” agents (Nowak and Sigmund, 1998b), since the other way around does not make much sense. This is similar to the so-called image scoring strategy (Nowak and Sigmund, 1998a). If an agent cooperates he gets a good reputation, and if an agent defect he gets a bad reputation. In this simplest model, we obtain the following dynamics. Let ri (t) ∈ {−1, 1} be the reputation of agent i in round t, so that ri (t) = −1 denotes a bad reputation and ri (t) = 1 denotes a good reputation. Then we randomly select an agent i for donation to an agent j. The reputation of agent j is r j (t) and if r j (t) = 1 agent i will help and his reputation will become ri (t + 1) = 1, but if r j (t) = −1 agent i will defect because j has a bad reputation, but he also gets a bad reputation because he has defected and so ri (t + 1) = −1. In short, ri (t + 1) = r j (t). Let us assume all players have initially a good reputation so that ri (0) = 1 for all i. Then it is clear that ri (t) = 1 for all t and all i in the absence of any other players. This is summarized in Fig. 9.3. Here the upper table denotes what the new reputation of the donor will be given his action. In this case this does not depend on the reputation of the recipient. Regardless of whether the 227

first order

9

Evolution of cooperation

recipient has a good or bad reputation, if the donor defects he will get a bad reputation. The lower table denotes what action the donor should take given the reputation of the recipient. Now let us introduce some defectors. Let us assume there is a proportion of x D = n D /n defectors and xC = nC /n discerning cooperators (those that cooperate or not based on the reputation). Since a defector will defect by default, he will always get a bad reputation if he is chosen as a donor. A discerning cooperator will then get a bad reputation if he defects against anybody, including defectors. Let us denote by nCG (t) the number of good agents amongst cooperators and by nG D (t ) the number of good agents amongst defectors. We denote by pC (t) = nCG (t)/nC the probability a cooperator has a good reputation, and similarly so for the defectors denote p D (t) = nG D (t )/ n D . The probability that the number of good agents amongst cooperators changes is then λ − = Pr(∆nCG (t) = −1) = xC pC ((1 − pC ) xC + (1 − p D ) x D ) λ + = Pr(∆nCG (t) = 1) = xC (1 − pC ) ( pC xc + p D x D ) .

reputation dynamics

Then letting n → ∞ (similar to the derivation of Eq. (9.39)) we obtain the reputation dynamics p˙ C = λ + − λ − = ( p D − pC ) xC x D . Defectors can only get a bad reputation, and never regain a good reputation since they will never cooperation. Working out similarly we obtain that p˙ D = − x D p D (9.53) The proportion of defectors that have a good reputation thus exponentially goes to zero, and p D (t) = e− xD t . Substituting this solution in Eq. (9.2.2) we obtain as solution pC (t ) =

1 xc − x D t e − xC x D t − e , 1 − xc 1 − xc

(9.54)

and so also pC (t) → 0 for t → ∞. So, even though these cooperators discern quite well the defectors (the probability they have a good reputation quickly goes to zero), the cooperators themselves will also end up with a bad reputation. Hence, in the end there won’t be any cooperation amongst these cooperators. 228

Towards cooperation

If we introduce unconditional cooperators (those who always cooperate irrespective of the reputation), the average reputation of the discerning cooperators will be higher. This still leads to problems however since the discerning cooperators and unconditional cooperators are evolutionary neutral, which might lead to invasion of defectors still (Nowak and Sigmund, 1998b). Second order Given that the first order scheme is unable to maintain a high reputation for cooperators themselves, it makes sense to discern whether somebody defects against somebody of a bad reputation or not (Brandt and Sigmund, 2004). After all, if somebody defects against somebody with a bad reputation this should not be punished by giving that person also a bad reputation. This was also suggested in the literature and is similar to the standing strategy (Leimar and Hammerstein, 2001; Panchanathan and Boyd, 2003), although experimental evidence suggested the simpler first order scheme (image scoring) prevailed among humans (Milinski, Semmann, Bakker et al., 2001). So, in the second order scheme we take into account the reputation of the recipient in order to determine whether cooperation or defection is justified. In particular, it allows to keep a good reputation when defecting against somebody with a bad reputation. Denote again by pC = nCG /nC the proportion of agents with a good reputation amongst the discriminating cooperation and p D = nG D / n D the same among defectors. We denote by Kxy ∈ {0, 1} if the new reputation should be good (Kxy = 1) or bad (Kxy = 0) given the reputation of the recipient x (good or bad) and the action y (cooperate or defect). For example, if KGC = 1 = G this indicates if an agent cooperates with an agent of a good reputation, he should get a good reputation. We denote by Z x if one should cooperate or defect in a certain situation. For example, if ZG = 1 = C then agents should cooperate with those with a good reputation. We abbreviate KxZx = Kx . The change rates are then given by Pr(∆nCG = −1) = xC pC ( xC pC + x D p D )(1 − KG )+

( xC (1 − pC ) + x D (1 − p D ))(1 − KB )



Pr(∆nCG = 1) = xC (1 − pC ) ( xC pC + x D p D )(1 − KG )+  ( xC (1 − pC ) + x D (1 − p D ))(1 − KB ) 229

second order

9 reputation dynamics

Evolution of cooperation

leading to p˙ C = ( xC pC + x D p D ) xC (KG − KB ) + xC (KB − pC ).

(9.55)

We would like to have that pC = 1 is a fixed point of these dynamics, so that if we start with a good reputation for the cooperators that the cooperators retain a good reputation. This implies that

( xC + x D p D )(KG − KB ) + (KB − 1) = 0. If KB = 0 we obtain that pC is only a fixed point for specific values of xC , x D and p D . Hence, in order for the fixed point to exist for all values, we must have KG = KB = 1. Obviously, we would also like discerning cooperators to cooperate, so that ZG = C and we obtain that KGC = G. Suppose that Z B = C, then an agent would also cooperate with somebody that has a bad reputation, hence, there is no interest in having a good reputation. So, we should have Z B = D and KBD = G = 1. Furthermore, the cooperators should not cooperate with agents that have a bad reputation and so KBC = B = 0. Likewise, if an agent defect against someone with a good reputation its reputation should be bad, so KGD = B = 0 since otherwise defecting will not give you a bad reputation and others continue to cooperate despite the fact that you have a bad reputation. Hence, among the 24 = 16 possible strategies, only one seems viable against defectors. This strategy is denoted in Fig. 9.4. Again, the upper table represents the new reputation of the donor based on his action and the reputation of the recipient. In this case, it is only good to cooperate with a good agent and to defect with a bad agent. This then gives us the reduced dynamics p˙ C = xC (1 − pC ).

(9.56)

The solution of which is clearly independent of p D , and leads to p(t) = 1 − (1 − p(0))e− xC t .

(9.57)

Now let us look at whether this fixed point is stable. The derivative at that point is ∂ p˙ C = ( x C + x D p D ) x c ( KG − K B ) − x c ∂pC 230

Towards cooperation

Reputation of recipient

Action of donor

G B C G B D B G C D

New reputation Action

Fig. 9.4 Second order indirect reciprocity

which with KG = KB = 1 becomes − xC ≤ 0, and so the fixed point is stable. Now let us look at the defectors. We denote by Kx0 = KxD . We obtain then 0 p˙ D = ( xC pC + x D p D ) x D (KG − KB0 ) + x D (KB0 − p D ). (9.58) Preferably we would like to have p D = 0 a fixed point. This implies that

( xC pC + x D )(KG0 − KB0 ) + KB0 = 0.

(9.59)

We already know that KBD = G = 1. Hence, this equality cannot hold for general xC , pC and x D . So, we cannot expect all defectors to have a bad reputation. 0 = 0. Now let us see what is a feasible fixed point given KB0 = 1 and KG In that case the dynamics reduce to

p˙ D = x D (1 − p D ) − ( xC pC + x D p D ) x D .

(9.60)

The only fixed point is thus p∗D =

1 − xC pC 1 + xD

which for pC = 1 (the globally attracting fixed point for the cooperators) comes down to xD p∗D = . (9.61) 1 + xD 231

9

Evolution of cooperation

The explicit solution for p D (t) is then h i ∗ ∗ p D (t) = p∗D 1 − e− pD t − (1 − p(0)) e− xC t + p D (0)e− pD t ,

(9.62)

with p∗D as in Eq. (9.61). Indeed pC (t) → 1 and p D (t) → p∗D for t → ∞ for all initial conditions. Assuming that pC (0) = p D (0) = 1, we obtain that pC (t) = 1 for all t and that   ∗ ∗ p D (t) = p∗D 1 − e− pD t + e− pD t . Assuming finitesmal games the cumulative payoffs after time t are then as follows 1 t bxC pC (τ ) − c( xC pC (τ ) + x D p D (τ ))dτ t 0 Z t 1 bx D p D (τ )dτ . FD ( xC , t) = t 0 FC ( xC , t) =

Z

Working this out we obtain  ∗ c FC ( xC , t) = xc (b − c) − cx D p∗D − 1 − e− p D t t  b ∗ − p∗D t FD ( xC , t) = bx D p D + 1−e . t For t → ∞ then of course cooperators cooperate with defectors about p∗D of the time, and we then obtain FC ( xC ) = xc (b − c) − cx D p∗D

FD ( x D ) = bx D p∗D The difference can be simplified to FD ( x D ) − FC ( x D ) =

  1 2bx2D − (b − c) 1 + xD

and the replicator equation becomes x˙ D = x D (1 − x D )

  1 2bx2D − (b − c) . 1 + xD

The fixed point in the replicator equation between the discerning coop232

Towards cooperation

erators and unconditional defectors is then r  c 1 ∗ xD = 1− . 2 b

(9.63)

Let us look at the stability of the fixed points. The derivative is ∂ x˙ D = (1 − 2x D )( FD ( x D ) − FC ( x D ))+ ∂x D xD (2bx D (2 − x D ) + (b − c) xc ) (1 + x D )2 ∗ = 1) we obtain For x∗D = 0 (so xC

∂ x˙ D ∂x D

(9.64)

= −(b − c) < 0 equally for x∗D = 1

∗ = 0) we obtain ∂ x˙ C = −b < 0. Both fixed points are hence stable. (so xC ∂x D For the fixed point x∗D in Eq. (9.63) we obtain that only the latter term in derivative (9.64) is non-zero, and it is always positive. Hence, the point x∗D is unstable. Since c < b this fixed point x∗D > 0 so that discriminating cooperators are never dominating. However, if x∗D > 2/3 the discriminating cooperates are evolutionary advantageous, which is the case if bc > 9, and they are risk dominant if x∗D > 1/2 which gives bc > 2.

Now let us look at the situation for relatively small t. We linearise around t = 0 and we then obtain   p∗ t FC ( xC , t) = xC (b − c) − cp∗D 1 + x D − D 2  ∗ t p FD ( xC , t) = bp∗D 1 + x D − D 2 In order to find the inner fixed point we have to solve a cubic polynomial, which isn’t very informative. Instead, let us focus on when FC > FD for xC = x D = 1/2 in order to determine when the cooperates are risk dominant. This is the case when 18 b > − 1, c t

(9.65)

which is only valid for small t. Then similar to TFT the interaction should last long enough, or stated otherwise the benefit-cost ratio must be high enough. Furthermore, we can look at the evolutionary stability of the discerning cooperators. This means that at x D = 0 the derivative should be ∂ x˙ d ∂ x˙ d ∂x < 0. This amounts to ∂x = −(b − c ) < 0 similar as before. Hence, the d

d

233

9

Evolution of cooperation

discerning cooperators are still evolutionary stable for small times. Third order

third order

One of the critiques against the second order scheme was that agents should only care about their own reputation and the associated rewards (Leimar and Hammerstein, 2001). Hence, they shouldn’t care about whether somebody else has a good reputation, but they should cooperate perhaps only to get a good reputation, and then defect as long as he keeps a good reputation. So, in the third order scheme we also take into account the reputation of the donor itself. This allows a plethora of different strategies, with 28 different new reputation schemes and 24 different possible action schemes (Brandt and Sigmund, 2004; Ohtsuki and Iwasa, 2004). Nonetheless, only a few strategies make actual sense, similar to the second order scheme (Ohtsuki and Iwasa, 2006). Let us then denote by K ( x, y, Z xy ) ∈ {1, 0} the reputation update function with Z ∈ {1, −1} the action matrix, where x is the reputation of the donor and y the reputation of the recipient. The action matrix denotes whether an agent should cooperate or not in a certain situation. For example if Z BG = −1 then an agent with a good reputation should defect with an agent with a bad reputation. So if K ( G, G, ZGG ) = G and ZGG = 1 = C this means if both i and j have a good reputation (ri = r j = 1) then i should cooperate (ZGG = 1) and i keeps his good reputation K ( G, G, ZGG ) = 1 = G. We will abbreviate K ( x, y, Z xy ) = Kxy . We are interested in knowing how different schemes (different reputation update matrices K and action matrices Z) will perform. As before, we will analyse the proportion of discerning cooperators that have a good reputation pC and the proportion of defectors that have a good reputation p D . We obtain Pr(∆nCG (t) = −1) = xC pC [( xC pC + x D p D )(1 − K ( G, G, ZGG ))+

( xC (1 − pC ) + x D (1 − p D ))(1 − K ( G, B, ZGB ))]

and Pr(∆nCG (t) = 1) = xC (1 − pC ) [( xC pC + x D p D )K ( B, G, Z BG )+

( xC (1 − pC ) + x D (1 − p D ))K ( B, B, Z BB )]

reputation dynamics

leading to 234

Towards cooperation

Reputation of donor and recipient

Action of donor

GG GB BG BB C

G

G

B



D

G

C

D

Fig. 9.5

B





New reputation

C

×

Action

Third order indirect reciprocity

p˙ C = ( xC pC + x D p D ) ( xC (1 − pC )KBG − xC pC (1 − KGG )) +

( xC (1 − pC ) + x D (1 − p D )) ( xC (1 − pC )KBB − xC pC (1 − KGB )) . (9.66)

0 = K ( x, y, D ) For defectors we obtain a similar result using Kxy

 0 0 p˙ D = ( xC pC + x D p D ) x D (1 − p D )KBG − x D p D (1 − KGG ) +

 0 0 ( xC (1 − pC ) + x D (1 − p D )) x D (1 − p D )KBB − x D p D (1 − KGB ) . (9.67) Notice that the only viable second order scheme corresponds to Z· B = D and Z·G = C and K (·, ·, C ) = G and K (·, ·, D ) = B, which is indeed consistent with the results here. Again, we would like that cooperators maintain a good reputation among each other. This means that p∗C = 1 should be a fixed point, and we arrive at 2 0 = p˙ C = − xC (1 − KGG ) − xC x D ( p D (KGB − KGG ) + 1 − KGB )

and by using x D = 1 − xC and dividing by xC we obtain

(KGG − KGB )( xc (1 − p D ) + p D ) − (1 − KGB )) > 0 Notice that setting xc (1 − p D ) + p D = 0 we obtain that p∗D =

− xC 0 the fixed point shifts. So, in general we should set KGB = KGG = 1. Furthermore, ZGG = C because otherwise the population would have a high reputation, but would not 0 cooperate. Also, K ( G, G, D ) = KGG = 0 = B since otherwise defecting would not be “punished” by assigning a bad reputation. Furthermore, suppose that ZGB = C. Then a good agent would cooperate with a bad agent, while not losing his good reputation. In that case it has no value to have a good reputation, and so ZGB = D. ∗ = 1 is stable, we arrive at the Again, demanding that the fixed point pC following inequality for the derivative ∂ p˙ C 0≥ ∂pC pC =1

= xC2 (2KGG − 2KGB − KBG + KBB ) − xc (KBB − KGB + 1)

leading eight

We already know that KGG = KGB = 1 so this reduces to −KBG − KBB (1 − xC ) ≤ 0. If KBG = 0 then KBB = 1 or otherwise p˙ CG = 0 and the fixed point is not stable. However, we would like this stability to be especially the case for xC = 1, and so we demand that at least KBG = 1 in which case KBB can be freely chosen. Now suppose that Z BG = −1 = D. Then a bad player would get a good reputation by defecting against a good player, and would effectively reward defecting. Hence, Z BG = 1 = C. Furthermore, suppose K ( B, G, D ) = G then there would be no reason to cooperate to get a good reputation again, and so K ( B, G, D ) = B. From this analysis we thus obtain the leading eight strategies indicated in Fig. 9.5. For a more elaborate argumentation as to why only these strategies perform well, refer to Ohtsuki and Iwasa (2004, 2006). Besides demanding that the discerning cooperators have a good reputation, we could also demand that defectors will get a bad reputation. Hence, we demand that p D = 0 is a fixed point, so that 0 0 xC x D pC [KBG − KBB ] + x D KBB = 0 0 0 If KBB = 1 then KBG = 0 and xC pC = 1, so that xC = 1 and pC = 1, 0 0 and there are effectively no defectors. Hence, KBB = 0. If KBG = 1 then

236

Private reputation

xC pC = 0 so that there are only defectors, in which case there are no rel0 0 evant reputations. Hence KBB = KBG = 0, and this results in one of the 0 leading eight strategies. If KBB = 1 we obtain that p D = 1+xDx is a stable D fixed point, assuming pC = 1, consistent with the second order strategy. 0 So, presumably KBB = 0 performs better in practice, because it allows to maintain a bad reputation for the defectors. We can also analyse the stability of the fixed point p D = 0. This point is stable whenever 0 0 0 x D xC pC (KGG − KGB ) − x D (1 − KGB )≤0

From the analysis of the stability of the fixed point pC = 1 we obtained 0 0 = 1 so that indeed the fixed point 0 is stable. that KGG = 0 and KGB

9.3

Private reputation In the previous section we saw what type of strategies of indirect reciprocity can lead to cooperation. However, these reputations are usually considered as objective. That is, for an agent i all agents know the reputation of agent i, and all agents have the same view of agent i. This assumption has sometimes been relaxed by assuming only a part of the population “observes” an interaction, and updates their opinions accordingly. If this probability of observation becomes too small, reputations are no longer synchronized, and some mechanism would be necessary to maintain some coherence. This is where we get back to dynamical models of social balance, which might overcome these issues. Although it allows to have private reputations (i.e. opinions), the dynamics also lead to some coherence. In addition, it models more explicitly the gossiping process, commonly suggested to be the foundation upon which reputations are forged. In addition, gossiping seems a more natural setting than “observing”, and it was found to enhance cooperation in various experiments (Sommerfeld, Krambeck and Milinski, 2008; Sommerfeld, Krambeck, Semmann et al., 2007; Piazza and Bering, 2008). Notice that the model X˙ = XX> is consistent with the leading second order strategy. Whenever the reputation of player j is good, (i.e. Xi j > 0) agents cooperate, and whenever it is bad (i.e. Xi j ≤ 0) agents defect. Furthermore, it is considered good to defect against bad players. For example, suppose that j defects k (X jk ≤ 0) and that i thinks k is bad (Xik ≤ 0), then 237

9

Evolution of cooperation

this will have a positive effect on j’s reputation (Xik X jk ≥ 0). Working out the remaining possibilities we arrive at the leading second order strategy illustrated in Fig. 9.4. Although private reputations could also potentially follow a third order strategy, this seems unlikely. Already private reputations in a second order scheme are relatively demanding on people, and experimental evidence suggests that people commonly adopt simpler methods (Milinski, Semmann, Bakker et al., 2001). Hence, it makes sense to restrict ourselves to second order strategies. Furthermore, a private first order strategy is not that interesting for a private reputation, since everybody will always be judged in the same way, regardless of the reputation of the recipient. Agents that use dynamics X˙ = X 2 will be referred to as type A, and agents that use dynamics X˙ = XX> as type B. Defectors are agents that always defect. We assume that all agents talk, and share information truthfully as requested by the demanding party (including defectors). For example, if a type A agents asks a defector what he thinks of another agent of type B, he will answer that he has defected. If type B would have gossiped with a defector about an agent of type A, the defector would have replied what that agent of type A did. In general, three types of agents might be in our population, and we can decompose the reputation matrix X accordingly as 

 XA X =  XB  , XD where X A are the reputations in the eyes of agents of type A, XB for type B and XD for defectors. The reputation for defectors will not change, and will always be negative, i.e. XD (t) = XD (0) < 0. For the results displayed here we have used XD (0) = −10, but results remain by and large the same when varying this parameter, as long as it remains sufficiently negative. As stated, the dynamics for type A and type B remain exactly as before X˙ A = X A X, X˙ B = XB X> , X˙ D = 0. Agents defect whenever X (t)i j ≤ 0 and cooperate whenever X (t)i j > 0. 238

Private reputation

We define the cooperation matrix C (t) accordingly ( Ci j (t) =

0 1

if Xi j ≤ 0 if Xi j > 0

Whenever an agent i cooperates with j, or C (t)i j = 1, agent j receives a payoff of b at a cost of c to agent i, as illustrated in Fig. 9.2. Since we are dealing with continuous dynamics here, we assume the agents are involved in infinitesimally short games. Assuming the solution of X A (t) and XB (t) blows up at time t∗ , we obtain the payoff vector P as F=

1 n

Z t∗ 0

bC (t)> e − cC (t)edt,

where e = (1, . . . , 1) the vector of all ones. Each element Fi contains the payoff for an individual agent i. Based on the payoffs P we let the population evolve. We sample our new population based on the payoff of this old population. We define the replication probability as φi =

exp βFi , ∑i exp βFi

which is the Boltzmann probability distribution, where β represents the selective pressure. Higher β signifies higher selective pressure, and leads to a higher reproduction of those with a high payoff, and in the limit β → ∞ only those with the maximum payoff reproduce. For β → 0 this tends to the uniform distribution, where payoffs no longer play any role. In other words, we simulate a Wright-Fisher process (see section 9.1.1) with fitness function f i = exp βFi . We have used β = 1 as the “standard” selective pressure, but have also simulated for high selective pressure (β = 5) and low selective pressure (β = 0.5). We stop the simulation whenever one of the types becomes fixated in the population. We repeat this process 1,000 times for the results using β = 1, and for the low (β = 0.5) and high (β = 5) selective pressure 100 times in order to estimate the fixation probability. Finally, we initialize the population with an equal number of agents of each type. The initial reputation X (0) is sampled from a standard Gaussian distribution with mean zero and standard deviation one. We reinitialize the reputation matrix every generation. The results are displayed in Fig. 9.6 using a normalized cost of c = 1 239

Boltzmann distribution

Evolution of cooperation

X˙ = X 2 X˙ = XX T Against each other Against defectors 1 Fixation Probability

9

0.75 0.5 0.25

5

10 b

15

20

Fig. 9.6 Evolutionary performance of both models

(the ratio b/c drives the evolutionary dynamics). When directly competing against each other, type B has an evolutionary advantage (its fixation probability ρ B > 1/2) compared to type A, already for relatively small benefits. When each type is playing against defectors (agents that always defect), type A seems unable to defeat defectors (ρ A < 1/2) for any b < 20, while type B performs quite well against them. When varying the number of agents, the critical benefit b∗ at which type B starts to have an evolutionary advantage changes (i.e. where the fixation probability ρ B = 1/2). For b > b∗ agents using the model X˙ = XX> have a higher chance to become fixated, while for b < b∗ defectors tend to win. The inequality for type B to have an evolutionary advantage can be √ relatively accurately approximated by b > b∗ = κ n where κ is estimated to be around κ ≈ 1.72 ± 0.037 (95% confidence interval). √ In summary, if b > κ n the model X˙ = XX> has an evolutionary c

advantage. Type B is able to lead to cooperation and defeats type A. Based on these results, if a gossiping process evolved during the course of human history in order to maintain cooperation, the model X˙ = XX> seems more likely to have evolved than X˙ = X 2 . For smaller groups a smaller benefit is needed for the model X˙ = XX> to become fixated. This dependence 240

Private reputation

Critical b ∗ √ β n 20

b∗

15

X˙ = XX T wins

10 Defectors win

5 0

10

20

30 n

40

50

60

Fig. 9.7 Performance for different number of agents

√ seems to scale only as n, so that larger groups only need a marginally larger benefit in order to develop cooperation. In addition to the results of competing both type A and type B separately against defectors, we also obtained results for populations initialized with type A, type B and defectors, all three at the same time. These results are largely the same as for one of the types against defectors. A small difference is that type A obtains a small advantage, because it can benefit from type B defeating the defectors. These results are reported in Fig. 9.8. The results for the different selective pressure are reported in Fig. 9.9. A higher selective pressure leads to a higher evolutionary advantage for type B, as could be expected. A lower selective pressure levels the playing field, and allows type A to survive almost as frequently as type B, although still somewhat less frequently. The performance against defectors however remains largely unchanged for type A, and they are still unable to survive against defectors. For type B, they tend to win more frequently for low benefits b for low selective pressure, while for higher benefit b the high selective pressure allows them to thrive. This is probably due to the relatively slim evolutionary advantage of defectors versus type B for low b, while the advantage of type B players is quite substantial at high b. 241

Evolution of cooperation

X˙ = X 2

X˙ = XX T

1 Fixation Probability

9

0.75 0.5 0.25

5

10 b

15

20

Fig. 9.8 Results including type A, B and defectors In conclusion, for second order indirect reciprocity, there seems to be only one leading strategy, namely it is good to cooperate with good people and good to defect against bad people, as reported in Fig. 9.4. When considering private reputations, second order strategies make more sense than first or third order strategies. Considering the single leading second order strategy for private reputation gives rise to a model such as X˙ = XX> . By the previous chapter we know this model has the tendency to split in two groups. Additionally, it is unable to maintain a bad reputation for the defectors at all times. Given these considerations, it is possible that social balance emerges as a by-product of a indirect reciprocity scheme in order to maintain cooperation. In this sense, the splitting into two factions and the maintenance of cooperation are two sides of the same coin. It has been suggested that gossiping has evolved to maintain cooperation and cohesive social networks (Dunbar, 1998). If that is true, its likely consequence is also that social groups split into antagonistic factions.

242

Private reputation

X˙ = X 2 X˙ = XX T Against each other Against defectors

Fixation Probability

1 0.75 0.5 0.25

5

10 b

15

20

(a) β = 0.5 X˙ = X 2 X˙ = XX T Against each other Against defectors

Fixation Probability

1 0.75 0.5 0.25

5

10 b

15

20

(b) β = 5

Fig. 9.9 Results different intensities of selection

243

10 I

Ranking nodes using reputation

the previous chapter we investigated the evolution of cooperation. In many situations we would like to know whether we could trust someone to cooperate or not. That is, suppose we are given some network of who (dis)trusts whom, would it then be possible to state whom we should trust and whom we should not trust? After all, perhaps somebody who indicates that he trusts somebody might not be trustworthy himself. N

10.1 Ranking nodes Suppose for the moment we would have only indications of trust (i.e. only positive links). In what way could we then indicate which node should be trusted more so then others? This idea is known as ranking nodes according to some reputation (or trust). For example, this idea forms the core of Google’s PageRank. It is the score Google assigns to pages indicating whether such a page has a “good” reputation or not, in order to return relevant search results (Brin and Page, 1998). The ranking of nodes, or assigning some “importance” or “trust” scores to nodes. Already in the 1970s, various researchers from the social sciences have introduced concepts such as betweenness (Freeman, 1977), closeness (Freeman, 1978) and eigenvector centrality (Bonacich, 2007, 1987) to measure how central or important a node in the network was. For example, centrality-like measures are shown to play an important role in spreading processes on networks, such as failing cascades (Watts, 2002), or the infection process of sexually transmitted diseases (De, Singh, Wong et al., 2004; Christley, Pinchbeck, Bowers et al., 2005). Furthermore, it helps to identify different roles nodes might play in a network (Perra and Fortunato, 2008). In the 1990s several alternative ranking measures were added, notably Kleinbergs HITS-algorithm (Kleinberg, 1999), and Google’s PageRank (Brin and Page, 1998). When file sharing and especially peer-to-peer applica-

10

Ranking nodes using reputation

tions grew, these measures, and variants thereof, became popular to keep “good” peers in the sharing network, and exclude “bad” peers (Kamvar, Schlosser and Garcia-Molina, 2003; Abrams, McGrew and Plotkin, 2004). Reputation and trust also plays a vital role in online markets such as eBay (Resnick, Zeckhauser, Swanson et al., 2006). Negative links however, are usually not taken into account by these ranking measures, or worse, they break down when negative entries appear as weights of the links. However, the signs of links (positive or negative) should not be ignored, since they may bear important consequences for the structure of the network, not in the least for the ranking of nodes. Proposals have been made to include such semantic information in hyperlinks on the World Wide Web (Massa and Hayes, 2005). Negative links are also present in various other settings such as reputation networks (Massa and Avesani, 2005), sharing networks (Kamvar, Schlosser and Garcia-Molina, 2003), social networks Szell, Lambiotte and Thurner (2010) and international networks (Maoz, Terris, Kuperman et al., 2008), and play a key, if not vital, role in these networks. Studying how negative links influence the importance of nodes may help the understanding of such systems, and such a concept of importance might facilitate the analyses of such networks. PageRank

Let us first briefly review the PageRank. Assume we have some adjacency matrix A. The reputation ri of node i should then be higher when it is recommended by nodes of a higher reputation. On the other hand, if a page points to many pages, the endorsement should be less strong. In other words, we could define the reputation recursively as ri =

∑ j

A ji r, kj j

(10.1)

and the reputation ri of node i is the sum of the reputations of the nodes that point to node i proportional to the degree. If we set M = ( D −1 A)> with D = diag(k) with k the degrees, this can also be written as r = Mr.

random walk

(10.2)

Notice that this is equivalent to the Markov chain for a random walk (see section 2.2.6). Hence, the reputation has a nice interpretation: it is the probability that we visit that node during a random walk. Moreover, in the context of surfing on the web this is also pertinent. The reputation of a web page can then be regarded as the probability that a random surfer visits 246

Ranking nodes

this page. Although this forms the basis for ranking, it has two problems: (1) dangling nodes, i.e. nodes that have no outgoing links; and (2) unconnected graphs. The first problem is remedied by supposing that in the random walk, whenever one meets a site that has no outgoing links, we will chose another site at random. In order to do so let ai = 1 if ki = 0 and ai = 0 otherwise. Then we define A0 = A + ae> where e = (1, . . . , 1). We then set M = ( D −1 A0 )> where D = diag(k) with k = A0 e the degrees of A0 . The second problem is remedied by adding a uniform probability to go to any site at all times. So, at each step, there is some probability α that the random surfer randomly jumps to another website, sometimes called the zap factor, which is commonly set to α = 0.85. This corresponds to setting 1 G = αM + (1 − α ) ee> . n

(10.3)

The page rank is then defined as the vector x for which x = Gx, i.e. the dominant eigenvector of the matrix G. This matrix is usually called the Google matrix. Because of the zapping factor α, the dominant eigenvector is unique and convergence is relatively quick. However, this and other methods only work if all weights Ai j ≥ 0 are non-negative. Hence, for negative links these type of methods break down, and other methods are needed. We will now analyse how we can introduce such a method. Recently there has been more attention to negative links in ranking measures, for example PageTrust (De Kerchove and Van Dooren, 2008). The difference between PageTrust and PageRank is that in the random walk in PageTrust nodes that are negatively pointed to during the random walk are blacklisted, and are visited less often, thereby lowering their PageTrust score. Another suggestion was to first calculate some ranking using only the positive links (e.g. using PageRank), and then apply one step of distrust, so that the negative links are taken into account (Guha, Kumar, Raghavan et al., 2004; Massa and Hayes, 2005). It was also suggested to introduce a propagation of distrust (Guha, Kumar, Raghavan et al., 2004), implying that if i distrusts j, and j distrusts r, then i should trust r (the adage that the enemy of my enemy is my friend). The authors noted that this could lead to situations in which a node is its own enemy (if one considers a cycle of three negative links), reminiscent of social balance (see chapter 7). 247

dangling node

zap factor

10

Ranking nodes using reputation

Given that a signed network might not be strictly balanced, an enemy of an enemy is not necessarily a friend. That is, if a node has a negative reputation, his links should not be distrusted, only trusted less. In other words, we should not assume a node with a negative reputation is not trustworthy (if he points negatively towards someone, we should not interpret it as positive, and vice versa), we should only trust his judgements less. This will actually follow from the derivation of the measure based on a discrete choice argument, which we will present in the following section. Most of the existing algorithms dealing with negative links do not apply distrust in such a recursive manner, thereby limiting their effect. Furthermore, none of the algorithms can actually deal with negative reputations, while this negativity can actually provide additional insight. For example, a negative reputation would signal that such a node should be blocked from the network. Interestingly, a slightly different formulation, namely that ri is some opinion or belief that node i holds, and it is updated according to the beliefs of its neighbours as Ai j ri ( t + 1 ) = ∑ r (t), kj j j has quite a different behaviour. Under the same conditions as for Eq. 10.2 (see also section 2.2.6) these opinions converge to some consensus, such that all agents have the same opinion or belief, i.e. ri (t) = r j (t) = r = hr(0)i for t → ∞ for all agents (DeGroot, 1974; Olfati-Saber, Fax and Murray, 2007). These results are independent of whether the opinions or beliefs are positive or negative. If negative links are considered however results do change, and this is subject of recent research (Altafini, 2012; Shi, Proutiere, Johansson et al., 2013), but we will not consider it further in this thesis.

10.2 Including negative links Let as usual G = (V, E) be a directed graph with n = |V | nodes and m = | E| edges. Each edge (i, j) has an associated weight wi j ∈ R which can possibly be negative. By A we denote the n × n weighted adjacency matrix associated to the graph, such that Ai j = wi j if there is an (i, j) edge and zero otherwise. Furthermore, let ri be some reputation of node i (we will make this explicit later on). We consider the links to indicate a certain trust: if node i points positively (negatively) to node j, this indicates that i trusts 248

Including negative links

(distrusts) j. The goal is to infer some global trust values from the local trust links. Suppose we are asked which node to trust, if we were to choose one. We assume that a higher reputation indicates some degree of trust, so we should preferably choose nodes which have a high reputation ri . However, there might be some errors in choosing the one with the highest reputation. This is where the framework of discrete choice theory comes in. The usual background for discrete choice theory is the following (Anderson, de de Palma and Thisse, 1992). Suppose there are n different choices (in our case, nodes), which have a different associated utility ui . We observe the utility oi and have some error term i such that ui = oi + i .

(10.4)

We would like to choose the object with the maximum utility. However, since we only observe oi , it is uncertain which item actually has the maximum real utility. So, the question becomes: what is the probability we will select a certain object? That is, what is the probability that ui ≥ u j for all i 6= j, or Pr(ui = max u j ), (10.5) j

depending on the observed utility oi and the error term i . In our case, we equate the observed utility oi with some reputation ri . We assume the real reputation is then ui = ri + i , where i is the error made in observing the reputation. The probability of choosing the node with the highest reputation depends on the distribution of the error term i . Using the following assumption for the error term, we arrive at the well known multinomial logit model (Anderson, de de Palma and Thisse, 1992). Suppose the i are i.i.d. double exponentially distributed1 according to    x Pr(i ≤ x) = exp − exp − +γ , µ

(10.6)

where γ ≈ 0.5772 is Euler’s constant. The mean of Eq. (10.6) equals zero, and the variance equals 1/6π 2 µ 2 . With this error distribution it can be proven (Anderson, de de Palma and Thisse, 1992) that the probability node 1 This

distribution is also known as the Gumbel distribution

249

discrete choice

10

Ranking nodes using reputation

i has the highest real reputation becomes pi = Boltzmann distribution

µ uncertainty

judge

exp

ri µ

∑ j exp

rj µ

.

(10.7)

This probability distribution is known as the Boltzmann distribution The probability a node i has the highest reputation, increases with higher reputation ri , depending on the amount of noise characterized by µ, which we will term the “uncertainty”. There are two extreme scenarios depending on µ. If µ → ∞ the variance goes to infinity, and the contribution of the observed reputation in ui = ri + i becomes negligibly small. In that case, the probability a node has the highest real reputation becomes uniform, or pi = 1/n. In the other extreme, µ → 0, there is essentially no error, and we will always be correct in choosing nodes with a maximum ri . That is, if there is a set of nodes M with ri = max j r j for i ∈ M, then pi = 1/| M| for i ∈ M, and zero otherwise. The probabilities p shows how much we should trust nodes. Nodes with a higher reputation are more trustworthy than nodes with a lower reputation. The difference in trust becomes more pronounced with decreasing µ, up to the point where we only trust nodes with the highest reputation. We shall call these probabilities the trust probabilities. The trust probabilities p depend on the reputation ri , which we will define now. We will ask a certain node j to provide the reputation values of the other nodes. That is, we ask node j to be the judge of his peers. Since we consider A ji to be the trust placed by node j in node i, we will assume that if node j is the judge, he would simply say that ri = A ji . The general idea is that the probability to be a judge depends on the reputation, which then influences that probability again. The probability to be chosen as judge is simply pi . Using those probabilities pi , we select a judge at random, and let him give his opinion on the reputation of his peers. We thus allow trustworthy nodes a higher probability to judge their peers. The expected reputation can then be written as ri = ∑ A ji p j , j

or in matrix notation, r = A> p, where A> is the transpose of A and p is a column probability vector (i.e. 250

Including negative links

k pk1 = 1 and pi ≥ 0). If we plug this formulation of the reputation into Eq. (10.7) we obtain a recursive formulation of trust probabilities p(t + 1) =

exp µ1 A> p(t)

k exp µ1 A> p(t)k1

,

(10.8)

for some initial condition p(0), with exp(·) the element-wise exponential. Notice that if we add some constant c to A, then p will remain unchanged. We will prove next that this iteration actually converges to a unique fixed point p∗ , i.e. independent of the initial conditions, for some range of values for µ. The final values of the trust probabilities can thus be defined as the limiting vector p∗ = limt→∞ p(t) or, equivalently, the fixed point p∗ for which exp µ1 A> p∗ p∗ = , (10.9) k exp µ1 A> p∗ k1 and the final reputation values as r∗ = A> p∗ .

(10.10)

Notice that these reputation values are also a fixed point of the equation r∗ = A>

exp µ1 r∗

k exp µ1 r∗ k1

(10.11)

and that the trust probabilities are related to the reputation values as p∗ =

exp µ1 r∗

k exp µ1 r∗ k1

.

(10.12)

In this sense, the trust probabilities and the reputation values can be seen as a dual formulation of each other. Upon closer examination of Eq. (10.11), a certain node j might indeed get a negative reputation, but his judgements are taken less into account, they are not reversed. That is, as soon as a node has a negative reputation, we do not assume he is completely untrustworthy, and that his negative judgements should be taken positive, but only that he is less trustworthy. This means we indeed do not assume that the enemy of my enemy is my friend. A node could get a negative reputation for example if he is nega251

10

Ranking nodes using reputation

a c

e

d

b

(a) Example network

a b c d e

PR

µ=1

µ = 1/5

µ = 1/8

0.183 0.184 0.263 0.184 0.186

0.223 0.213 0.223 0.171 0.171

0.384 0.179 0.384 0.026 0.026

0.424 0.142 0.424 0.005 0.005

(b) Trust for various values of µ

a b c d e

t=0

t=1

t=2

t=3

0.20 0.20 0.20 0.20 0.20

0.50 – 0.50 – –

0.3 0.3 0.3 – –

0.5 – 0.5 – –

(c) Cyclic behaviour for µ = 0

Table 10.1

Example trust probabilities

tively pointed to by trustworthy nodes. This approach can be summarized in the idea that the reputation of a node depends on the reputation of the nodes pointing to him, or stated differently, a node is only as trustworthy as the nodes that trust him. Notice that this idea is similar to that of PageRank, namely that nodes are as important or trustworthy as the neighbours pointing to him (Brin and Page, 1998). Let us take a look at a small example to see what the effect is of negative links in a network as shown in Table 10.1. There is only one negative link, from a to d. The effect of the negative link becomes more penalizing when µ is decreased, as shown in Table 10.1b. That has also consequences for node e, who is only pointed to by d, who receives little trust, which then also leads to little trust for e. The PageRank for these nodes (for which we 252

Including negative links

Exp Rank µ = 0.1

Exp Rank µ = 1

1 Barabási, A

Barabási, A

Barabási, A

2 Newman, M

Jeong, H

Newman, M

3 Sole, R

Newman, M

Jeong, H

4 Jeong, H

Pastorsatorras, R

Pastorsatorras, R

5 Pastorsatorras, R

Vespignani, A

Vespignani, A

6 Boccaletti, S 7 Vespignani, A

Moreno, Y

Moreno, Y

Sole, R

Sole, R

8 Moreno, Y

Oltvai, Z

Boccaletti, S

9 Kurths, J

Albert, R

Vazquez, A

Vazquez, A

Diazguilera, A

PageRank

10 Stauffer, D

Table 10.2 Top 10 rankings.

did not take into account the negative link, and used a zapping factor of 0.85) are provided as comparison, which assigns nodes d and e actually higher rankings. Of course, this measure can also be applied to networks without negative links. It is interesting to compare the exponential rank to the PageRank. In this case we have taken the co-authorship network of network scientists from Newman (2006). This network includes 379 nodes in the largest connected component, and in Table 10.2 we list the top 10 highest ranked nodes for three different methods: (1) PageRank; (2) exponential rank with µ = 0.1; and (3) exponential rank with µ = 1. A famous network scientist, Barabási remains the highest ranked author in all three methods. For the rest there are quite some differences between PageRank and the exponential rank using µ = 0.1. The rankings for µ = 0.1 are relatively similar to the rankings for µ = 1. Nonetheless, the correlation between the PageRank and the two different exponential rankings are quite high: 0.91 and 0.97 for µ = 0.1 and µ = 1 respestively. The rank correlation reveals there are more changes in the rank though, reaching only 0.61 for both µ = 0.1 and µ = 1. We visualize the network using PageRank in Fig. 10.1a and the exponential ranking with µ = 0.1 in Fig. 10.1b. We will now show that indeed this limit converges (for some range of µ) and is unique, i.e. does not depend on the actual initial condition p(0). 253

10

Ranking nodes using reputation

10.3 Convergence and uniqueness More formally, let us define the map V : Sn → Sn , which maps V ( p) = unit simplex mixed matrix norm

exp µ1 A> p

k exp µ1 A> pk1

,

(10.13)

where Sn = { y ∈ Rn+ : k yk1 = 1}, the n-dimensional unit simplex. For the proof of convergence we rely on mixed matrix norms, or subordinate norms, which are defined as

k Ak p,q = max k Axk p .

(10.14)

k xkq =1

Denoting by k Akmax = maxi j | Ai j |, we have the following useful inequality k Axk∞ = max ke>i Axk ≤ k Akmax · k xk1 , i

hence

k Ak∞,1 ≤ k Akmax Jacobian

(10.15)

where ei is the i-th coordinate vector. Let us now take a look at the Jacobian of V, which can be expressed as exp( µ1 A> p)i µ1 A ji exp( µ1 A> p)i ∑l exp( µ1 A> p)l µ1 A jl ∂V ( p)i = − . 2  ∂p j ∑l exp( µ1 A> p)l ∑ exp( 1 A> p) l

l

µ

Now let u = exp( µ1 A> p), and q = kuk1 . Then V ( p) = u/q, and

∂V ( p)i ∂p j

can

be simplified to

∂V ( p)i 1 = ∂p j µ

ui 1 A − q ji q2

!

∑ ui ul A jl l

or in matrix notation 1 V ( p) = µ 0



1 1 diag(u) − 2 uu> q q



A>

(10.16)

at which point the following lemma is useful. Lemma 10.1. Denote by M ( p) the matrix M ( p) = diag( p) − pp> where p ∈

254

Convergence and uniqueness

Sn , then k M( p)k1,∞ ≤ 1. Proof. Note that k M( p) xk1 = ∑in=1 pi | xi − p> x|. We need to find the maximum of this function on the unit box (that is, where k xk∞ = 1). By convexity of norms, the maximum of k M( p) xk1 is attained at the boundary, i.e. some vector σ ∈ Rn with coordinates ±1. Denoting by I+ = {i : σi = 1} the set of positive entries, and by S1 = ∑i∈ I+ pi and S2 = 1 − S1 . Then p>σ = S1 − S2 , and we have n

k M( p)σ k1 =

∑ pi |σi − S1 + S2 | = ∑

i ∈ I+

i =1

pi | 1 − S 1 + S 2 | +



i∈ / I+

pi | 1 + S 1 − S 2 |

= S1 (1 − S1 + S2 ) + S2 (1 + S1 − S2 ) = 1 − ( S1 − S2 )2 . Since ( S1 − S2 )2 ≥ 0, k M( p)σ k1 ≤ 1. This immediately leads to the following proof that the map V converges. Theorem 10.2. For µ > 21 (maxi j Ai j − mini j Ai j ) the map V has a unique fixed

point p ∈ Sn .

Proof. By the Banach fixed point theorem, this map has a unique fixed point if it is contractive. That is, there should be a c < 1 such that

kV ( p) − V (u)k1 ≤ c, k p − uk1

(10.17)

for p, u ∈ Sn . That is, we should have kV 0 ( p)k1,1 ≤ c. Since we can write V 0 ( p) = µ1 M(V ( p)) A, using the lemma and Eq. (10.15) we arrive at

kV 0 ( p)k1,1 =

1 1 1 k M(V ( p)) Ak1,1 ≤ k M(V ( p))k1,∞ k Ak∞,1 ≤ k Akmax . µ µ µ

Since adding a constant to our matrix A does not change the vector V ( p), we can subtract 21 (mini j Ai j + maxi j Ai j ), and arrive at

kV 0 ( p)k1,1 ≤ Hence, if µ>

1 (max Ai j − min Ai j ). 2µ i j ij

1 (max Ai j − min Ai j ), 2 ij ij 255

Banach fixed point

10

Ranking nodes using reputation

the map V is contractive and by the Banach fixed point theorem, it will have a unique fixed point, and iterates will converge to that point. For this lower bound on µ, we can guarantee convergence of the iteration. Below this lower bound, we choose nodes with more and more certainty. As we said in Sec. 10.2, when µ → 0 the probabilities pi = 1/| M| for i in some set M of nodes with maximal reputation ri . In the iteration this means only nodes with the highest reputation can become judges. Since we completely trust his judgements, whatever node(s) he assigns the highest reputation will be the next judge. Unless everyone always agrees on the node with the highest reputation, cycles of judges pointing to the next judge will emerge. For example, if we take µ → 0 for the example network given in Table 10.1, we cycle as follows. We start out with p(0) = 1/n, and the average reputation will be highest for nodes a and c, and they will be chosen as judge with probability 1/2. In the next iteration the average reputation will be 1/2 for nodes a, b and c and zero for d and e. Hence, one of the nodes a, b and c will be selected as judge, and the average reputation is 2/3 for a and c, and 1/3 for b. Now we are back where we were after the first iteration, since a and c both have the same maximal reputation, and they are chosen as judge each with probability 1/2, as summarized in Table 10.1c.

256

Convergence and uniqueness

Carroll, T Johnson, G

Heagy, J

Fink, K

Banavar, J Fedroff, N

Barahona, M

Rinaldo, A

Pecora, L Allaria, E Pelaez, A

Rigon, R

Cieplak, M

Giacometti, A

Mitra, M

Rodrigueziturbe, I

Holter, N

Montuori, M Bottaccio, M Delucia, M

Maritan, A

Pietronero, L

Loreto, V Parisi, D Cecconi, F Radicchi, F

Vespignani, A Samukhin, A

Dorogovtsev, S Vragovic, I

Roux, S

Hong, D

Garciafernandez, J

Gautrais, J

Tu, Y

Kim, B

Choi, M

Park, H

Simonsen, I Costa, U

Adler, J

Aleksiejuk, A

Sienkiewicz, J

Fronczak, A

Diambra, L

Lusseau, D

Callaway, D

Matthews, P

Pennock, D

Giles, C

Mirollo, R

Lawrence, S

Yeung, M

Coetzee, F

Watts, D

Latora, V

Bennaim, E Frauenfelder, H

Ergun, G

Thurner, S

Toroczkai, Z

Tadic, B

Korniss, G

Caruso, F

Hengartner, N

Rapisarda, A

Forrest, S

Tieri, P

Kozma, B

Bassler, K Corral, A

Paczuski, M Baiesi, M

Porta, S

Valensin, S

Moore, C

Crucitti, P

Remondini, D Castellani, G

Usai, L

Sanwalani, V

Frasca, M

Stagni, C

Muhamad, R

Fortuna, L Spata, A Larosa, M

Cosenza, S

Rothman, D

Kumar, S

Stata, R Wiener, J

Vazquez, F Leyvraz, F

Franceschi, C

Kalapala, V

Dodds, P

Sabel, C

Kleinberg, J

Krapivsky, P

Rodgers, G

Kinney, R Pluchino, A

Marchiori, M

Balthrop, J

Gastner, M

Ancelmeyers, L

Hopcroft, J

Jin, E

Girvan, M

Martin, M

Schrag, S

Strogatz, S

Glover, E

Clauset, A

Park, J Mucha, P

Antal, T

Kim, J

Redner, S Darbydowman, K

Newman, M

Aharony, A

Gorman, S

Stroud, D

Kim, S Jung, S

Fortunato, S

Ghoshal, G

Warmbrand, C

Czirok, A

Kulkarni, R

Farkas, I

Almaas, E

Kim, D

Lee, D

Nakarado, G

Porter, M

Dafontouracosta, L

Kovacs, B

Ravasz, E

Ghim, C

Maslov, S

Stauffer, D

Marodi, M

Vicsek, T

Somera, A

Segev, R

Shochet, O

Dovidio, F Macdonald, P

Kahng, B

Albert, I

Bak, P

Zaliznyak, A

Eriksen, K

Meyerortmanns, H

Leicht, E

Goh, K

Albert, R

Rosvall, M

Sneppen, K

Bernardes, A Araujo, A

Park, Y

Rho, K

Hong, H

Golding, I

Derenyi, I

Schubert, A

Oh, E

Minnhagen, P

Szabo, G

Holyst, J

Flake, G

Yoon, C

Neda, Z

Oltvai, Z

Jeong, H

Han, S

Chung, J

Trusina, A

Jedynak, M

Tombor, B

Huss, M

Holme, P

Ayali, A

Shefi, O

Benjacob, E Cohen, I

Beg, Q

Dobrin, R Mason, S

Liljeros, F

Dezso, Z

Mongru, D

Podani, J

Aberg, Y

Edling, C

Kertesz, J P Fronczak,

Martinez, N

Berlow, E

Wuchty, S

Yook, S

Szathmary, E

Alava, M Jarisaramaki, J

Dunne, J

Barabasi, A

Moreira, A

Andrade, J

Penna, T

Demenezes, M

Williams, R

Schwartz, N

Lahtinen, J

Kaski, K

Onnela, J

Moukarzel, C

Cohen, R

Bianconi, G

Janssen, C

Ferrericancho, R

Chakraborti, A Kanto, A

Provero, P

Herrmann, C

Kohler, R

Valverde, S

Havlin, S

Erez, K Rozenfeld, A

Benavraham, D

Scala, A

Cancho, R

Deneubourg, J

Capocci, A

Gondran, B

Montoya, J

Buhl, J

Defraysseix, H

Echenique, P

Bonanno, G

Sole, R

Theraulaz, G

Kuntz, P

Liu, Z

Gomezgardenes, J

Nekovee, M

Mossa, S

Stanley, H

Lai, Y Ye, N

Mantegna, R Lillo, F

Hoppensteadt, F Demoura, A

Dasgupta, P

Gomez, J

Makse, H

Amaral, L

Herrmann, H

Dearcangelis, L

Gregoire, G

Song, C

Camacho, J

Salazarciudad, I

Chate, H

Vazquezprada, M

Vegaredondo, F

Turtschi, A Kepler, T

Gonzales, M

Knuutila, J Ilmoniemi, R

Nishikawa, T Grebogi, C

Barthelemy, M

Guichard, E

Smith, E

Sousa, A

Lounasmaa, O

Hamalainen, M

Hari, R

Motter, A

Cabrales, A

Yusong, T

Gross, J

Rudzick, O

Osipov, G

Zhou, C

Arenas, A

Giralt, F Gleiser, P

Guimera, R

Abel, H

Maza, D

Weule, M

Vallone, A

Chavez, M

Munoz, M

Floria, L

Pastorsatorras, R

Guardiola, X

Muren, L

Pacheco, A

Boguna, MBarrat, A

Perez, C

Diazguilera, A

Lingjiang, K

Soffer, S

Weigt, M

Ramasco, J

Rubi, M

Louis, E

Danon, L

Colaiori, F

Kurths, J Pikovsky, A Freund, H

Moreno, Y

Delosrios, P

Coccetti, F

Zecchina, R

Salmelin, R

Schnitzler, A

Schafer, C

Petermannn, T

Vazquez, A

Leone, M

Goltsev, A

Boccaletti, S

Hwang, D

Donetti, L Lopezruiz, R Garrido, P

Servedio, V

Caldarelli, G

Flammini, A Vilone, D

Llas, M

Battiston, S

Rosenblum, M

Valladares, D

Amann, A Dickman, R

Torres, J

Catanzaro, M

Castri, M

Volkmann, J

Zaks, M

Park, E

Mancini, H

Hentschel, H

Marro, J

Loffredo, M

Garlaschelli, D

Castellano, C

Mendes, J

Vannucchi, F

Kujala, J Timmermann, L

Tass, P

Meucci, R Digarbo, A

Arecchi, F Bragard, J

Mendoza, C

Rajagopalan, S Tomkins, A Raghavan, P

Bucolo, M

Maghoul, F Broder, A

Sivakumar, D

Kumar, R Upfal, E

(a) PageRank Carroll, T Johnson, G Heagy, J

Fink, K

Pecora, L

Rodrigueziturbe, I

Maritan, A

Bottaccio, M

Delucia, M

Donetti, L Castri, M

Flammini, A

Mendes, J

Samukhin, A

Louis, E

Hong, D

Stanley, H

Gautrais, J

Tu, Y Szathmary, E

Holme, P

Kanto, A

Minnhagen, P

Szabo, G

Kertesz,Fronczak, J P

Sneppen, K Bernardes, A

Simonsen, I Costa, U

Adler, J

Holyst, J

Choi, M

Park, H

Meyerortmanns, H

Araujo, A Aleksiejuk, A

Stauffer, D

Sienkiewicz, J Diambra, L

Fronczak, A

Lusseau, D

Callaway, D

Lawrence, S Kleinberg, J

Watts, D Sabel, C

Dodds, P Muhamad, R Rothman, D

Kumar, S

Rajagopalan, S Tomkins, A Raghavan, P

Balthrop, J

Gastner, M

Ancelmeyers, L

Hopcroft, J Yeung, M

Coetzee, F

Krapivsky, P

Darbydowman, K

Girvan, M

Martin, M

Schrag, S

Strogatz, S Mirollo, R

Antal, T Kim, J

Kim, S Jung, S

Redner, S

Clauset, A

Park, J Mucha, P

Leicht, E

Giles, C

Kim, D

Lee, D

Nakarado, G

Newman, M Jin, E

Rodgers, G

Kinney, R

Thurner, S

Pluchino, A

Tadic, B

Latora, V

Gorman, S

Kulkarni, R

Farkas, I Stroud, D

Kahng, B

Albert, I

Czirok, A

Almaas, E

Fortunato, S

Ghoshal, G

Warmbrand, C

Matthews, P

Goh, K

Albert, R

Segev, R

Marodi, M

Vicsek, T

Kovacs, B

Ravasz, E

Ghim, C

Maslov, S

Aharony, A

Pennock, D

Golding, I

Shochet, O

Dovidio, F

Porter, M

Dafontouracosta, L

Glover, E

Rho, K

Hong, H

Bak, P Zaliznyak, A

Eriksen, K

Neda, Z

Derenyi, I

Schubert, A Park, Y

Ayali, A

Shefi, O

Benjacob, E Cohen, I

Beg, Q

Somera, A

Oltvai, Z

Jeong, H Oh, E

Rosvall, M

Alava, M

Jedynak, M

Flake, G

Yoon, C

Kim, B

Trusina, A

Lahtinen, J

Kaski, K Jarisaramaki, J

Han, S

Chung, J

Janssen, C

Ferrericancho, R

Onnela, J

Tombor, B

Huss, M

Liljeros, F

Kohler, R

Valverde, S Chakraborti, A

Dezso, Z

Macdonald, P

Dobrin, R Mason, S

Edling, C

Cancho, R

Deneubourg, J

Martinez, N

Berlow, E

Wuchty, S Mongru, D

Yook, S Podani, J

Aberg, Y

Montoya, J

Buhl, J

Defraysseix, H

Dunne, J

Barabasi, A

Moreira, A

Andrade, J

Bonanno, G

Penna, T

Demenezes, M

Williams, R

Schwartz, N

Bianconi, G

Scala, A

Mantegna, R Lillo, F

Sole, R

Moukarzel, C

Cohen, R

Benavraham, D

Provero, P

Herrmann, C Gondran, B

Amaral, L

Herrmann, H

Garciafernandez, J Salazarciudad, I

Kuntz, P

Makse, H

Havlin, S

Erez, K Rozenfeld, A

Mossa, S

Camacho, J

Dearcangelis, L

Capocci, A

Song, C

Turtschi, A Kepler, T

Roux, S

Theraulaz, G

Gomezgardenes, J

Echenique, P

Barthelemy, M

Guichard, E

Smith, E Gonzales, M

Liu, Z

Ye, N

Vegaredondo, F

Guimera, R

Lai, Y

Gomez, J

Cabrales, A

Yusong, T

Hoppensteadt, F Demoura, A

Dasgupta, P

Arenas, A

Giralt, F Gleiser, P

Sousa, A

Nishikawa, T Grebogi, C

Vazquezprada, M

Pastorsatorras, R

Guardiola, X

Motter, A

Floria, L

Nekovee, M

Boguna, M Barrat, A

Perez, C

Danon, L

Muren, L

Soffer, S Weigt, M

Ramasco, J

Rubi, M

Diazguilera, A

Lingjiang, K

Vazquez, A

Zecchina, R

Dorogovtsev, S Vragovic, I Llas, M

Pacheco, A

Leone, M

Goltsev, A

Chate, H Gregoire, G

Moreno, Y

Colaiori, F

Hari, R

Rudzick, O

Osipov, G

Zhou, C

Petermannn, T

Delosrios, P

Coccetti, F

Ilmoniemi, R

Gross, J

Vallone, A

Chavez, M

Munoz, M

Servedio, V

Caldarelli, G

Vilone, D

Vespignani, A

Lopezruiz, R Garrido, P

Battiston, S

Castellano, C

Hwang, D

Torres, J

Catanzaro, M

Garlaschelli, D

Knuutila, J

Weule, M

Pikovsky, A

Abel, H

Maza, D

Boccaletti, S

Marro, J

Loffredo, M

Parisi, D Radicchi, F

Hamalainen, M

Schnitzler, A Freund, H

Kurths, J Valladares, D

Amann, A Dickman, R

Pietronero, L Loreto, V Cecconi, F

Lounasmaa, O Salmelin, R

Schafer, C

Mancini, H

Hentschel, H

Volkmann, J

Rosenblum, M

Park, E

Bragard, J

Vannucchi, F Montuori, M

Timmermann, L

Zaks, M

Digarbo, A

Arecchi, F

Mendoza, C

Giacometti, A Mitra, M

Tass, P

Meucci, R Allaria, E

Pelaez, A

Rigon, R

Cieplak, M

Holter, N

Kujala, J

Barahona, M

Rinaldo, A Banavar, J Fedroff, N

Vazquez, F Leyvraz, F

Bennaim, E Frauenfelder, H

Ergun, G

Toroczkai, Z Korniss, G

Marchiori, M

Hengartner, N

Rapisarda, A

Moore, C

Tieri, P Kalapala, V

Baiesi, M

Porta, S

Valensin, S Remondini, D

Corral, A

Paczuski, M

Franceschi, C

Forrest, S

Kozma, B

Bassler, K

Caruso, F

Crucitti, P

Castellani, G

Usai, L

Sanwalani, V

Frasca, M

Stagni, C Cosenza, S

Fortuna, L Spata, A

Larosa, M Bucolo, M

Maghoul, F Stata, R

Broder, A Sivakumar, D

Wiener, J

Kumar, R Upfal, E

(b) Exponential ranking µ = 0.1

Fig. 10.1 Co-authorship network of network scientists.

257

11 I

Conclusion

N this thesis we have explored two broad subjects: community detection and negative links. The latter subject is however also related to community detection, since networks with negative links are often believed to be organized into factions, such that positive links fall within factions and negative links in between them. We have seen how we can address the issue of the resolution limit, and suggested a very simple model (CPM) that circumvents this problem. In addition, CPM has a very natural interpretation: each community is expected to have a density of at least γCPM , while the density between two communities should be less then γCPM . Choosing some particular γCPM is not straightforward however and depends on the network in question. Nevertheless we were able to provide some insight into the different partitions returned for some γCPM . In particular, we introduced the notion of the “significance” of a partition, which helps in choosing some meaningful resolution parameter γCPM . It is in some sense ironic that we return to the significance of a partition. In first instance, the popular method of modularity (Newman and Girvan, 2004) was introduced in order to choose some “significant” level in an hierarchical clustering method. Because this method suffered from a resolution limit, we introduced the Constant Potts Model (CPM) that didn’t rely on any comparison to a random graph. Yet, in order to determine a meaningful resolution, we returned to some comparison to a random graph. In this sense, we are back at square one: we have some single measure in order to determine some “significant” level. This makes one wonder whether there exists any method that is capable of always detecting the “correct” partition. As we have seen, the problem of the resolution limit is usually associated to depending on some graph properties beyond the immediate link—only local methods do not seem to suffer from the resolution limit. Yet, a local method cannot be used to decide whether a partition is “meaningful” or not. In this sense,

11

Conclusion

we might conjecture, in similar spirit as Kleinberg (2003) his “impossibility theorem on clustering”, that no community detection method exists that is both scale invariant and, in some vague notion, “meaningful”. Concerning negative links and social balance, we have shown that only the model X˙ = XX> attains social balance generically. This implies that for almost any initial condition, this model will converge to social balance. Moreover, once some network has attained social balance, for almost all perturbations away from social balance, the dynamics will return to social balance. This explains why we see so often networks split in two opposing camps. In addition, the model X˙ = XX> seems to be able to explain the evolution of cooperation through indirect reciprocity if reputations are private. It had been theorized that humans developed language so they could gossip about others, in order to strengthen their social network and sustain larger group sizes (Dunbar, 1998). Yet our analysis suggests a subtly different mechanism: gossip didn’t evolve to strengthen social networks but to maintain cooperation and dispel defectors. It is therefore ironic that the model predicts a split in two factions: even though gossip might have evolved to keep larger groups together, as a by product it seems to split groups in two. Whereas gossip was argued to be inclusive (it would integrate members of some social group), it also is exclusive (it repels members from different groups). Nonetheless, the models currently analysed do exhibit several unrealistic features, we would like to address: (1) an all-to-all topology; (2) dynamics that blow-up in finite time; and (3) homogeneity of all agents. Although most of these issues can be addressed by specifying different dynamics, the resulting models are much more difficult to analyse, thereby limiting our understanding. Although the two models are somewhat simple, they are also tractable, and what we lose in truthfulness, we gain in deeper insights: in simplicity lies progress. Our current analysis offers a quite complete understanding for these relatively simple models.

260

Bibliography

Abou-Kandil, H (2003). Matrix Riccati Equations: In Control and Systems Theory. Springer. ISBN 376430085X. Abrams, Z, McGrew, R and Plotkin, S (2004). Keeping Peers Honest in EigenTrust. In 2nd Workshop on the Economics of Peer-to-Peer Systems. Adami, C and Hintze, A (2012). Winning isn’t everything: Evolutionary instability of Zero Determinant strategies. arXiv:1208.2666. Aldecoa, R and Marín, I (2011). Deciphering Network Community Structure by Surprise. PLoS ONE, 6(9):e24195. doi: 10.1371/journal.pone.0024195. Aldecoa, R and Marín, I (2013). Surprise maximization reveals the community structure of complex networks. Scientific reports, 3:1060. doi: 10.1038/srep01060. Alexander, RD (1987). The Biology of Moral Systems. Aldine de Gruyter, New York. Altafini, C (2012). Dynamics of opinion forming in structurally balanced social networks. PloS one, 7(6):e38135. doi: 10.1371/journal.pone.0038135. Anderson, JE (1979). A Theoretical Foundation for the Gravity Equation. American Economic Review, 69(1):106–116. Anderson, JE and van Wincoop, E (2003). Gravity with Gravitas: A Solution to the Border Puzzle. American Economic Review, 93:170–192. Anderson, SP, de de Palma, A and Thisse, JF (1992). Discrete Choice Theory of Product Differentiation. The MIT Press, Cambridge. Angell, N (1933). The Great Illusion: A Study of the Relation of Military Power in Nations to their Economic and Social Advantage. W. Heinemann, London.

11

BIBLIOGRAPHY

Antal, T, Krapivsky, P and Redner, S (2005). Dynamics of social balance on networks. Physical Review E, 72(3):36121. doi: 10.1103/PhysRevE.72.036121. Arenas, A, Fernandez, A and Gomez, S (2007). Analysis of the structure of complex networks at different resolution levels. New Journal of Physics, 10(5):23. doi: 10.1088/1367-2630/10/5/053039. arXiv:physics/0703218. Axelrod, R (1984). Evolution Of Cooperation. Basic Books. ISBN 0465021220. Bagrow, J (2012). Communities and bottlenecks: Trees and treelike networks have high modularity. Physical Review E, 85(6):9. doi: 10.1103/PhysRevE.85.066118. arXiv:1201.0745. Barigozzi, M, Fagiolo, G and Mangioni, G (2011). Identifying the community structure of the international-trade multi-network. Physica A: Statistical Mechanics and its Applications, 390(11):2051–2066. doi: 10.1016/j.physa.2011.02.004. arXiv:1009.1731. Bearman, PS and Moody, J (2004). Suicide and Friendships Among American Adolescents. American Journal of Public Health, 94(1):89–95. doi: 10.2105/AJPH.94.1.89. Beck, N, Katz, JN and Tucker, R (1998). Taking Time Seriously: Time-SeriesCross-Section Analysis with a Binary Dependent Variable. American Journal of Political Science, 42(4):1260–1288. Bichot, CE and Siarry, P (2011). Graph Partitioning. Wiley. ISBN 184821233X. Blondel, VD, Guillaume, JL, Lambiotte, R and Lefebvre, E (2008). Fast unfolding of communities in large networks. Journal of Statistical Mechanics: Theory and Experiment, 2008(10):P10008. doi: 10.1088/17425468/2008/10/P10008. Böhmelt, T (2009). International Mediation and Social Networks: The Importance of Indirect Ties. International Interactions, 35(3):298–319. Böhmelt, T (2010). The Impact of Trade on International Mediation. Journal of Conflict Resolution, 54(4):566–592. Bollobás, B (2001). Random Graphs. Cambridge University Press, Cambrige, second edition. 262

BIBLIOGRAPHY

Bonacich, P (1987). Power and centrality: A family of measures. American journal of sociology. Bonacich, P (2007). Some unique properties of eigenvector centrality. Social Networks, 29:555–564. doi: 10.1016/j.socnet.2007.04.002. Brandes, U, Delling, D, Gaertler, M, Goerke, R, Hoefer, M et al. (2006). Maximizing Modularity is hard. arXiv:physics, page 0608255. arXiv:physics/0608255. Brandes, U, Delling, D, Gaertler, M, Gorke, R, Hoefer, M et al. (2008). On Modularity Clustering. IEEE Transactions on Knowledge and Data Engineering, 20(2):172–188. doi: 10.1109/TKDE.2007.190689. Brandt, H and Sigmund, K (2004). The logic of reprobation: assessment and action rules for indirect reciprocation. Journal of theoretical biology, 231(4):475–86. doi: 10.1016/j.jtbi.2004.06.032. Bremer, SA (1992). Dangerous Dyads: Conditions Affecting the Likelihood of Interstate War, 1816-1965. Journal of Conflict Resolution, 36(2):309–341. doi: 10.1177/0022002792036002005. Bremer, SA (1993). flict, 1816–1965.

Democracy and militarized interstate conInternational Interactions, 18(3):231–249. doi: 10.1080/03050629308434806.

Brin, S and Page, L (1998). The anatomy of a large-scale hypertextual Web search engine. Computer Networks and ISDN Systems, 30(1-7):107–117. doi: 10.1016/S0169-7552(98)00110-X. Bruggeman, J, Traag, VA and Uitermark, J (2012). Detecting Communities through Network Data. American Sociological Review, 77(6):1050–1063. doi: 10.1177/0003122412463574. Bunse-Gerstner, A, Byers, R, Mehrmann, V and Nichols, NK (1991). Numerical computation of an analytic singular value decomposition of a matrix valued function. Numerische Mathematik, 60(1):1–39. doi: 10.1007/BF01385712. Cartwright, D and Harary, F (1956). Structural balance: a generalization of Heider’s theory. Psychological Review, 63(5):277–293. doi: 10.1037/h0046049. 263

11

BIBLIOGRAPHY

Cartwright, D and Harary, F (1968). On the Coloring of Signed Graphs. Elemente der Mathematik, 23(4):85 – 89. doi: 10.5169/seals-26032. Cartwright, D and Harary, F (1979). Balance and clusterability: An overview, pages 25–50. Academic Press, New York. Case, DO and Higgins, GM (2000). How can we investigate citation behavior? A study of reasons for citing literature in communication. Journal of the American Society for Information Science, 51(7):635–645. doi: 10.1002/(SICI)1097-4571(2000)51:73.0.CO;2-H. Cho, Y, Gorina, S, Jeffrey, P and Pavletich, N (1994). Crystal structure of a p53 tumor suppressor-DNA complex: understanding tumorigenic mutations. Science, 265(5170):346–355. doi: 10.1126/science.8023157. Christley, RM, Pinchbeck, GL, Bowers, RG, Clancy, D, French, NP et al. (2005). Infection in social networks: using network analysis to identify high-risk individuals. American journal of epidemiology, 162(10):1024–31. doi: 10.1093/aje/kwi308. Clauset, A, Newman, M and Moore, C (2004). Finding community structure in very large networks. Physical Review E, 70(6):1–6. doi: 10.1103/PhysRevE.70.066111. Cover, TM and Thomas, JA (2012). Elements of Information Theory, volume 2012. John Wiley & Sons. ISBN 1118585771. Crescenzi, MJC (2005). Economic Interdependence and Conflict in World Politics. Lexington, Lanham, MD. Csáji, B, Browet, A, Traag, VA, Delvenne, JC, Huens, E et al. (2012). Exploring mobility of mobile users. Physica A, 392(6):1459–1473. doi: 10.1016/j.physa.2012.11.040. Danon, L, Díaz-Guilera, A, Duch, J and Arenas, A (2005). Comparing community structure identification. Journal of Statistical Mechanics: Theory and Experiment, 2005:P09008. doi: 10.1088/1742-5468/2005/09/P09008. Davis, JA (1967). Clustering and Structural Balance in Graphs. Human Relations, 20(2):181–187. doi: 10.1177/001872676702000206. De, P, Singh, AE, Wong, T, Yacoub, W and Jolly, AM (2004). Sexual network analysis of a gonorrhoea outbreak. Sexually transmitted infections, 80(4):280–5. doi: 10.1136/sti.2003.007187. 264

BIBLIOGRAPHY

De Kerchove, C and Van Dooren, P (2008). The PageTrust algorithm: how to rank web pages when negative links are allowed. In Proceedings of the SIAM International Conference on Data Mining, pages 346–352. SIAM. De Leenheer, P and Sontag, ED (2004). A note on the monotonicity of matrix Riccati equations. Technical report, DIMACS. De Tocqueville, A (2002). Democracy in America. Penguin Books Limited, London. ISBN 9780141915692. DeGroot, MH (1974). Reaching a consensus. Journal of the American Statistical Association, 69(345):118–121. doi: 10.2307/2285509. Delvenne, JC, Yaliraki, SN and Barahona, M (2010). Stability of graph communities across time scales. Proceedings of the National Academy of Sciences of the United States of America, 107(29):12755–60. doi: 10.1073/pnas.0903215107. Doreian, P, Batagelj, V and Ferligoj, A (2005). Generalized Blockmodeling. Cambridge University Press, Cambridge. ISBN 9780521840859. Dorussen, H and Ward, H (2008). Intergovernmental Organizations and the Kantian Peace: A Network Perspective. Journal of Conflict Resolution, 52(2):189–212. doi: 10.1177/0022002707313688. Dorussen, H and Ward, H (2010). Trade networks and the Kantian peace. Journal of Peace Research, 47(1):29–42. doi: 10.1177/0022343309350011. Doyle, MW (1986). Empires. Cornell University Press, Ithaca, NY. ISBN 9780801493348. Duch, J and Arenas, A (2005). Community detection in complex networks using extremal optimization. Physical review E, 72(2):1–4. doi: 10.1103/PhysRevE.72.027104. Dunbar, RIM (1998). Grooming, Gossip, and the Evolution of Language. Harvard University Press, Cambridge. ISBN 0674363361. Durrett, R and Levin, SA (2005). Can stable social groups be maintained by homophilous imitation alone? Journal of Economic Behavior & Organization, 57(3):267–286. doi: 10.1016/j.jebo.2003.09.017. Elias, N and Scotson, JL (1994). The Established and the Outsiders. SAGE Publications, London. ISBN 9780803979499. 265

11

BIBLIOGRAPHY

Everitt, BS, Landau, S and Leese, M (2001). Cluster Analysis. Wiley. ISBN 9780340761199. Expert, P, Evans, TS, Blondel, VD and Lambiotte, R (2011). Uncovering space-independent communities in spatial networks. Proceedings of the National Academy of Sciences of the United States of America, 108(19):7663– 8. doi: 10.1073/pnas.1018962108. arXiv:arXiv:1012.3409v1. Fehr, E and Fischbacher, U (2004). Third-party punishment and social norms. Evolution and Human Behavior, 25(2):63–87. doi: 10.1016/S10905138(04)00005-4. Festinger, L (1957). A theory of cognitive dissonance. Stanford University Press, Stanford. ISBN 9780804709118. Fortunato, S (2010). Community detection in graphs. Physics Reports, 486(35):75–174. doi: 10.1016/j.physrep.2009.11.002. Fouss, F, Pirotte, A, Renders, JM and Saerens, M (2007). Random-walk computation of similarities between nodes of a graph with application to collaborative recommendation. IEEE Transactions on Knowledge and Data Engineering, 19(3):355–369. doi: 10.1109/TKDE.2007.46. Freeman, LC (1977). A Set of Measures of Centrality Based on Betweenness. Sociometry, 40(1):35. doi: 10.2307/3033543. Freeman, LC (1978). Centrality in social networks conceptual clarification. Social Networks, 1(3):215–239. doi: 10.1016/0378-8733(78)90021-7. Friedkin, NE (2001). Norm formation in social influence networks. Social Networks, 23(3):167–189. doi: 10.1016/S0378-8733(01)00036-3. Fu, F, Nowak, MA, Christakis, NA and Fowler, JH (2012). The Evolution of Homophily. Scientific Reports, 2. doi: 10.1038/srep00845. Fukuyama, F (1992). The end of history and the last man. Free Press (Macmillan), New York. ISBN 9781416531784. Gartzke, E (2007). The Capitalist Peace. American Journal of Political Science, 51(1):166–191. doi: 10.1111/j.1540-5907.2007.00244.x. Gasiorowski, M and Polachek, S (1982). Conflict and Interdependence: East-West Trade and Linkages in the Era of Detente. Journal of Conflict Resolution, 26(4):709–729. 266

BIBLIOGRAPHY

Ghosn, F, Palmer, G and Bremer, S (2004). The MID3 Data Set, 1993-2001: Procedures, Coding Rules, and Description. Conflict Management and Peace Science, 21:133–154. Gibler, DM and Sarkees, MR (2004). Measuring Alliances: the Correlates of War Formal Interstate Alliance Dataset, 1816–2000. Journal of Peace Research, 41(2):211–222. doi: 10.1177/0022343304041061. Gilpin, R (1981). War and Change in World Politics. Cambridge University Press, Cambridge, UK. ISBN 9780521273763. Girvan, M and Newman, MEJ (2002). Community structure in social and biological networks. Proceedings of the National Academy of Sciences of the United States of America, 99(12):7821–6. doi: 10.1073/pnas.122653799. Gleditsch, KS (2002). Expanded Trade and Gdp Data. Journal Of Conflict Resolution, 46(5):712–724. doi: 10.1177/002200202236171. Gleditsch, KS (2003). All International Politics Is Local: The Diffusion of Conflict, Integration, and Democratization. University of Michigan Press, Ann Arbor. ISBN 9780472023356. Gochman, CS and Maoz, Z (1984). Militarized Interstate Disputes, 18161976: Procedure, Patterns, and Insights. Journal of Conflict Resolution, 28(4):585–615. Good, BH, de Montjoye, YA and Clauset, A (2010). Performance of modularity maximization in practical contexts. Physical Review E, 81(4):046106. doi: 10.1103/PhysRevE.81.046106. Greenwald, AG, Banaji, MR, Rudman, LA, Farnham, SD, Nosek, BA et al. (2002). A unified theory of implicit attitudes, stereotypes, self-esteem, and self-concept. Psychological Review, 109(1):3–25. doi: 10.1037/0033295X.109.1.3. Guha, R, Kumar, R, Raghavan, P and Tomkins, A (2004). Propagation of trust and distrust. In Proceedings of the 13th conference on World Wide Web - WWW ’04, page 403. ACM Press, New York, New York, USA. ISBN 158113844X. doi: 10.1145/988672.988727. Guimerà, R, Mossa, S, Turtschi, A and Amaral, LAN (2005). The worldwide air transportation network: Anomalous centrality, community structure, and cities’ global roles. Proceedings of the National 267

11

BIBLIOGRAPHY

Academy of Sciences of the United States of America, 102(22):7794–9. doi: 10.1073/pnas.0407994102. Guimerà, R and Nunes Amaral, LA (2005). Functional cartography of complex metabolic networks. Nature, 433(7028):895–900. doi: 10.1038/nature03288. Guimerà, R, Sales-Pardo, M and Amaral, L (2004). Modularity from fluctuations in random graphs and complex networks. Physical Review E, 70(2):025101. doi: 10.1103/PhysRevE.70.025101. Hagmann, P, Cammoun, L, Gigandet, X, Meuli, R, Honey, CJ et al. (2008). Mapping the structural core of human cerebral cortex. PLoS biology, 6(7):e159. doi: 10.1371/journal.pbio.0060159. Hamilton, W (1964). The genetical evolution of social behaviour I. Journal of Theoretical Biology, 7(1):1–16. doi: 10.1016/0022-5193(64)90038-4. Hamilton, WD (1967). Extraordinary Sex Ratios. Science, 156(3774):477– 488. doi: 10.1126/science.156.3774.477. Hanney, S, Frame, L, Grant, J, Buxton, M, Young, T et al. (2005). Using Categorizations of Citations when Assessing the Outcomes from Health Research. Scientometrics, 65(357). Harary, F (1953). On the notion of balance of a signed graph. The Michigan Mathematical Journal, 2(2):143–146. doi: 10.1307/mmj/1028989917. Henderson, EA and Tucker, R (2001). Clear and Present Strangers: The Clash of Civilizations and International Conflict. International Studies Quarterly, 45(2):317–338. doi: 10.1111/0020-8833.00193. Hensel, PR, Goertz, G and Diehl, PF (2008). The Democratic Peace and Rivalries. The Journal of Politics, 62(04):1173–1188. doi: 10.1111/00223816.00052. Hilbe, C, Nowak, MA and Sigmund, K (2012). The Evolution of Extortion in Iterated Prisoner’s Dilemma Games. arXiv:1212.1067. Hofbauer, J and Sigmund, K (1998). Evolutionary Games and Population Dynamics. Cambridge University Press. ISBN 052162570X. Huntington, SP (1996). The clash of civilizations and the remaking of world order. Simon & Schuster, New York. ISBN 9781416561248. 268

BIBLIOGRAPHY

Imhof, LA and Nowak, MA (2006). Evolutionary game dynamics in a Wright-Fisher process. Journal of mathematical biology, 52(5):667–81. doi: 10.1007/s00285-005-0369-8. Jain, A and Dubes, R (1988). Algorithms for clustering data. Prentice-Hall. ISBN 978-0130222787. Jaynes, E (1957). Information Theory and Statistical Mechanics. Physical Review, 106(4):620–630. doi: 10.1103/PhysRev.106.620. Jones, DM, Bremer, SA and Singer, JD (1996). Militarized Interstate Disputes, 1816-1992: Rationale, Coding Rules, and Empirical Patterns. Conflict Management and Peace Science, 15(2):163–213. doi: 10.1177/073889429601500203. Kamvar, SD, Schlosser, MT and Garcia-Molina, H (2003). The Eigentrust algorithm for reputation management in P2P networks. In Proceedings of the twelfth international conference on World Wide Web - WWW ’03, page 640. ACM Press, New York, New York, USA. ISBN 1581136803. doi: 10.1145/775152.775242. Kashtan, N and Alon, U (2005). Spontaneous evolution of modularity and network motifs. Proceedings of the National Academy of Sciences of the United States of America, 102(39):13773–8. doi: 10.1073/pnas.0503610102. Kato, T (1995). Perturbation Theory for Linear Operators. Springer, New York. ISBN 354058661X. Kernighan, BW and Lin, S (1970). An efficient heuristic procedure for partitioning graphs. The Bell System Technical Journal, 49(1):291–307. Kindleberger, CP (1986). The World in Depression, 1929-1939. University of California Press, Berkeley. ISBN 9780520055926. Kirkpatrick, S, Gelatt, CD and Vecchi, MP (1983). Optimization by simulated annealing. Science (New York, N.Y.), 220(4598):671–80. doi: 10.1126/science.220.4598.671. Kissinger, H (1994). Diplomacy. Simon & Schuster, New York. ISBN 9781439126318. Kleinberg, J (2003). An Impossibility Theorem for Clustering. In Advances in neural information processing systems. MIT Press. ISBN 0-262-02550-7. 269

11

BIBLIOGRAPHY

Kleinberg, J and Lawrence, S (2001). Network analysis. The structure of the Web. Science (New York, N.Y.), 294(5548):1849–50. doi: 10.1126/science.1067014. Kleinberg, JM (1999). Authoritative Sources in a Hyperlinked Environment. Journal of the ACM, 46(5):604–632. doi: 10.1145/324133.324140. Kolaczyk, ED (2009). Statistical Analysis of Network Data: Methods and Models. Springer. ISBN 9780387881461. Krasner, SD (1999). Sovereignty: Organized Hypocrisy. Princeton University Press, Princeton, NJ. ISBN 9781400823260. Krings, G (2012). Extraction of information from large networks. Ph.D. thesis, Université catholique de Louvain. Krings, G and Blondel, VD (2011). An upper bound on community size in scalable community detection. arXiv:1103.5569. Kuhn, T (2012). The structure of scientific revolutions. The University of Chicago Press, Chicago. ISBN 9780226458144. Kulakowski, K, Gawronski, P and Gronek, P (2005). The Heider balance - a continuous approach. International Journal of Modern Physics C, 16(5):707– 716. doi: 10.1142/S012918310500742X. Kumpula, JM, Saramäki, J, Kaski, K and Kertész, J (2007). Limited resolution in complex network community detection with Potts model approach. The European Physical Journal B, 56(1):41–45. doi: 10.1140/epjb/e2007-00088-4. Labianca, G and Brass, DJ (2006). Exploring the social ledger: Negative relationships and negative asymmetry in social networks in organizations. Academy of Management Review, 31(3):596–614. doi: 10.5465/AMR.2006.21318920. Labianca, G, Brass, DJ and Gray, B (1998). Social networks and perceptions of intergroup conflict: The role of negative relationships and third parties. Academy of Management Journal, 41(1):55–67. doi: 10.2307/256897. Lakey, B, Tardiff, TA and Drew, JB (1994). Negative Social Interactions: Assessment and Relations to Social Support, Cognition, and Psychological Distress. Journal of Social and Clinical Psychology, 13(1):42–62. doi: 10.1521/jscp.1994.13.1.42. 270

BIBLIOGRAPHY

Lambiotte, R, Blondel, VD, De Kerchove, C, Huens, E, Prieur, C et al. (2008). Geographical dispersal of mobile communication networks. Physica A: Statistical Mechanics and its Applications, 387(21):5317–5325. doi: 10.1016/j.physa.2008.05.014. Lambiotte, R, Delvenne, JC and Barahona, M (2008). Laplacian Dynamics and Multiscale Modular Structure in Networks. pages 1–29. arXiv:0812.1770. Lancichinetti, A and Fortunato, S (2009). Community detection algorithms: A comparative analysis. Physical Review E, 80(5):056117. doi: 10.1103/PhysRevE.80.056117. Lancichinetti, A, Fortunato, S and Radicchi, F (2008). Benchmark graphs for testing community detection algorithms. Physical Review E, 78(4):46110. doi: 10.1103/PhysRevE.78.046110. Lancichinetti, A, Radicchi, F, Ramasco, JJ and Fortunato, S (2011). Finding statistically significant communities in networks. PloS one, 6(4):e18961. doi: 10.1371/journal.pone.0018961. Leicht, E and Newman, M (2008). Community Structure in Directed Networks. Physical Review Letters, 100(11):1–4. doi: 10.1103/PhysRevLett.100.118703. Leimar, O and Hammerstein, P (2001). Evolution of cooperation through indirect reciprocity. Proceedings. Biological sciences / The Royal Society, 268(1468):745–53. doi: 10.1098/rspb.2000.1573. Lupu, Y and Traag, VA (2012). Trading Communities, the Networked Structure of International Relations, and the Kantian Peace. Journal of Conflict Resolution. doi: 10.1177/0022002712453708. MacKay, D (2003). Information theory, inference and learning algorithms. Cambridge University Press, Cambridge. ISBN 9780521642989. Manning, CD, Raghavan, P and Schütze, H (2008). Introduction to Information Retrieval. Cambridge University Press, Cambridge. ISBN 9780521865715. Maoz, Z (2006). Network Polarization, Network Interdependence, and International Conflict, 1816-2002. Journal of Peace Research, 43(4):391–411. doi: 10.1177/0022343306065720. 271

11

BIBLIOGRAPHY

Maoz, Z (2009). The Effects of Strategic and Economic Interdependence on International Conflict Across Levels of Analysis. American Journal of Political Science, 53(1):223–240. doi: 10.1111/j.1540-5907.2008.00367.x. Maoz, Z and Russett, B (1992). Alliances, Contiguity, Distance,Wealth, and Political Stability: Is the Lack of Conflict Among Democracies a Statistical Artifact? International Interactions, 17(3):245–268. Maoz, Z and Russett, B (2012). Normative and Structural Causes of Democratic Peace, 1946–1986. American Political Science Review, 87(03):624–638. doi: 10.2307/2938740. Maoz, Z, Terris, LG, Kuperman, RD and Talmud, I (2008). What Is the Enemy of My Enemy? Causes and Consequences of Imbalanced International Relations, 1816–2001. The Journal of Politics, 69(01):100–115. doi: 10.1111/j.1468-2508.2007.00497.x. Marshall, M and Jaggers, K (2002). Polity IV Project: Political Regime Characteristics and Transitions, 1800-2002. Marvel, S, Strogatz, S and Kleinberg, J (2009). Energy Landscape of Social Balance. Physical Review Letters, 103(19):198701. doi: 10.1103/PhysRevLett.103.198701. arXiv:0906.2893. Marvel, SA, Kleinberg, J, Kleinberg, RD and Strogatz, SH (2011). Continuous-time model of structural balance. Proceedings of the National Academy of Sciences of the United States of America, 108(5):1771–6. doi: 10.1073/pnas.1013213108. Massa, P and Avesani, P (2005). Controversial Users demand Local Trust Metrics : an Experimental Study on Epinions. In Proceedings of the National Conference on Artificial Intelligence, pages 121–126. Massa, P and Hayes, C (2005). Page-reRank: Using Trusted Links to ReRank Authority. In The 2005 IEEE/WIC/ACM International Conference on Web Intelligence (WI’05), pages 614–617. IEEE. ISBN 0-7695-2415-X. doi: 10.1109/WI.2005.112. Maynard Smith, J (1982). Evolution and the Theory of Games. Cambridge University Press, Cambridge. ISBN 0521288843. Maynard Smith, J and Price, G (1973). The Logic of Animal Conflict. Nature, 246(5427):15–18. doi: 10.1038/246015a0. 272

BIBLIOGRAPHY

Mcpherson, M, Smith-Lovin, L and Cook, JM (2001). Birds of a Feather: Homophily in Social Networks. Annual Review of Sociology, 27(1):415– 444. doi: 10.1146/annurev.soc.27.1.415. Meil˘a, M (2007). Comparing clusterings—an information based distance. Journal of Multivariate Analysis, 98(5):873–895. doi: 10.1016/j.jmva.2006.11.013. Meunier, D, Lambiotte, R, Fornito, A, Ersche, KD and Bullmore, ET (2009). Hierarchical modularity in human brain functional networks. Frontiers in neuroinformatics, 3:37. doi: 10.3389/neuro.11.037.2009. arXiv:1004.3153. Milinski, M, Semmann, D, Bakker, TC and Krambeck, HJ (2001). Cooperation through indirect reciprocity: image scoring or standing strategy? Proceedings. Biological sciences / The Royal Society, 268(1484):2495–501. doi: 10.1098/rspb.2001.1809. Mirshahvalad, A, Lindholm, J, Derlén, M and Rosvall, M (2012). Significant communities in large sparse networks. PloS one, 7(3):e33721. doi: 10.1371/journal.pone.0033721. arXiv:1110.0305. Montgolfier, FD, Soto, M and Viennot, L (2011). Asymptotic modularity of some graph classes. Lecture Notes in Computer Science, 7074:435–444. doi: 10.1007/978-3-642-25591-5_45. Mucha, PJ, Richardson, T, Macon, K, Porter, MA and Onnela, JP (2010). Community structure in time-dependent, multiscale, and multiplex networks. Science (New York, N.Y.), 328(5980):876–8. doi: 10.1126/science.1184819. arXiv:0911.1824. Nash, J (1953). Two-Person Cooperative Games. Econometrica, 21(1):128. doi: 10.2307/1906951. Newman, M (2004). Fast algorithm for detecting community structure in networks. Physical Review E, 69(6). doi: 10.1103/PhysRevE.69.066133. Newman, M (2010). Networks: An Introduction. Oxford University Press, USA. ISBN 0199206651. Newman, M and Girvan, M (2004). Finding and evaluating community structure in networks. Physical Review E, 69(2):026113. doi: 10.1103/PhysRevE.69.026113. 273

11

BIBLIOGRAPHY

Newman, MEJ (2006). Finding community structure in networks using the eigenvectors of matrices. Physical Review E, 74(3):036104+. doi: 10.1103/PhysRevE.74.036104. Nowak, M and Sigmund, K (1993). A strategy of win-stay, lose-shift that outperforms tit-for-tat in the Prisoner’s Dilemma game. Nature, 364(6432):56–8. doi: 10.1038/364056a0. Nowak, MA (2006a). Evolutionary Dynamics: Exploring the Equations of Life. Belknap Press of Harvard University Press. ISBN 0674023382. Nowak, MA (2006b). Five rules for the evolution of cooperation. Science (New York, N.Y.), 314(5805):1560–3. doi: 10.1126/science.1133755. Nowak, MA, Sasaki, A, Taylor, C and Fudenberg, D (2004). Emergence of cooperation and evolutionary stability in finite populations. Nature, 428(April). doi: 10.1038/nature02360. Nowak, MA and Sigmund, K (1998a). Evolution of indirect reciprocity by image scoring. Nature, 393(6685):573–7. doi: 10.1038/31225. Nowak, MA and Sigmund, K (1998b). The dynamics of indirect reciprocity. Journal of theoretical biology, 194(4):561–74. doi: 10.1006/jtbi.1998.0775. Nowak, MA and Sigmund, K (2005). Evolution of indirect reciprocity. Nature, 437(7063):1291–8. doi: 10.1038/nature04131. Ohtsuki, H and Iwasa, Y (2004). How should we define goodness?– reputation dynamics in indirect reciprocity. Journal of theoretical biology, 231(1):107–120. doi: 10.1016/j.jtbi.2004.06.005. Ohtsuki, H and Iwasa, Y (2006). The leading eight: social norms that can maintain cooperation by indirect reciprocity. Journal of Theoretical Biology, 239(4):435–44. doi: 10.1016/j.jtbi.2005.08.008. Olfati-Saber, R, Fax, JA and Murray, RM (2007). Consensus and cooperation in networked multi-agent systems. Proceedings of the IEEE, 95(1):215–233. Olson, M (1965). The logic of collective action: public goods and the theory of groups. Harvard University Press, Boston. ISBN 9780674041660. Oneal, J and Russett, B (1997). The Classical Liberals Were Right: Democracy, Interdependence, and Conflict, 1950-1985. International Studies Quarterly, 41(2):267–293. 274

BIBLIOGRAPHY

Oneal, J and Russett, B (2005). Rule of Three, Let It Be? When More Really Is Better. Conflict Management and Peace Science, 22(4):293–310. doi: 10.1080/07388940500339209. Oneal, JR, Oneal, FH, Maoz, Z and Russett, B (1996). The Liberal Peace: Interdependence, Democracy, and International Conflict, 1950-85. Journal of Peace Research, 33(1):11–28. doi: 10.1177/0022343396033001002. Oneal, JR and Russett, B (2011). The Kantian Peace: The Pacific Benefits of Democracy, Interdependence, and International Organizations, 1885–1992. World Politics, 52(1):1–37. doi: 10.1017/S0043887100020013. Oneal, JR, Russett, B and Berbaum, ML (2003). Causes of Peace: Democracy, Interdependence, and International Organizations, 18851992. International Studies Quarterly, 47(3):371–393. doi: 10.1111/14682478.4703004. Onnela, J, Saramäki, J, Hyvönen, J, Szabó, G, Lazer, D et al. (2007). Structure and tie strengths in mobile communication networks. Proceedings of the National Academy of Sciences of the United States of America, 104(18):7332–6. doi: 10.1073/pnas.0610245104. Panchanathan, K and Boyd, R (2003). A tale of two defectors: the importance of standing for evolution of indirect reciprocity. Journal of Theoretical Biology, 224(1):115–126. doi: 10.1016/S0022-5193(03)00154-1. Perra, N and Fortunato, S (2008). Spectral centrality measures in complex networks. Physical Review E, 78(3):036107. doi: 10.1103/PhysRevE.78.036107. Pevehouse, J, Nordstrom, T and Warnke, K (2004). The Correlates of War 2 International Governmental Organizations Data Version 2.0. Conflict Management and Peace Science, 21(2):101–119. doi: 10.1080/07388940490463933. Piazza, J and Bering, JM (2008). Concerns about reputation via gossip promote generous allocations in an economic game. Evolution and Human Behavior, 29(3):172–178. doi: 10.1016/j.evolhumbehav.2007.12.002. Picciolo, F, Squartini, T, Ruzzenenti, F, Basosi, R and Garlaschelli, D (2012). The role of distances in the World Trade Web. In Proceedings of 2012 Eighth International Conference on Signal Image Technology and Internet Based Systems. doi: 10.1109/SITIS.2012.118. arXiv:1210.3269. 275

11

BIBLIOGRAPHY

Polachek, SW (1980). Conflict and Trade. Journal of Conflict Resolution, 24(1):55–78. doi: 10.1177/002200278002400103. Polachek, SW, Robst, J and Chang, YC (1999). Liberalism and Interdependence: Extending the Trade-Conflict Model. Journal of Peace Research, 36(4):405–422. doi: 10.1177/0022343399036004002. Porter, MA, Mucha, PJ, Newman, MEJ and Warmbrand, CM (2005). A network analysis of committees in the U.S. House of Representatives. Proceedings of the National Academy of Sciences of the United States of America, 102(20):7057–62. doi: 10.1073/pnas.0500191102. Porter, MA, Onnela, Jp and Mucha, PJ (2009). Communities in Networks. Notices of the AMS, 56(9):1082–1097. arXiv:0902.3788. Press, WH and Dyson, FJ (2012). Iterated Prisoner’s Dilemma contains strategies that dominate any evolutionary opponent. Proceedings of the National Academy of Sciences of the United States of America, 109(26):10409– 13. doi: 10.1073/pnas.1206569109. Raghavan, U, Albert, R and Kumara, S (2007). Near linear time algorithm to detect community structures in large-scale networks. Physical Review E, 76(3):036106. doi: 10.1103/PhysRevE.76.036106. Reichardt, J and Bornholdt, S (2006a). Statistical mechanics of community detection. Physical Review E, 74(1):016110+. doi: 10.1103/PhysRevE.74.016110. Reichardt, J and Bornholdt, S (2006b). When are networks truly modular? Physica D: Nonlinear Phenomena, 224(1-2):20–26. doi: 10.1016/j.physd.2006.09.009. Reichardt, J and Bornholdt, S (2007). Partitioning and modularity of graphs with arbitrary degree distribution. Physical Review E, 76(1):015102. doi: 10.1103/PhysRevE.76.015102. Reichardt, J and White, DR (2007). Role models for complex networks. The European Physical Journal B, 60(2):217–224. doi: 10.1140/epjb/e200700340-y. Resnick, P, Zeckhauser, R, Swanson, J and Lockwood, K (2006). The value of reputation on eBay: A controlled experiment. Experimental Economics, 9(2):79–101. doi: 10.1007/s10683-006-4309-2. 276

BIBLIOGRAPHY

Ronhovde, P and Nussinov, Z (2009). Multiresolution community detection for megascale networks by information-based replica correlations. Physical Review E, 80(1):016109. doi: 10.1103/PhysRevE.80.016109. Ronhovde, P and Nussinov, Z (2010). Local resolution-limit-free Potts model for community detection. Physical Review E, 81(4):046114. doi: 10.1103/PhysRevE.81.046114. arXiv:arXiv:0803.2548v4. Rosvall, M and Bergstrom, CT (2008). Maps of random walks on complex networks reveal community structure. Proceedings of the National Academy of Sciences of the United States of America, 105(4):1118–23. doi: 10.1073/pnas.0706851105. Rosvall, M and Bergstrom, CT (2010). Mapping change in large networks. PloS one, 5(1):e8694. doi: 10.1371/journal.pone.0008694. arXiv:arXiv:0812.1242v1. Rosvall, M and Bergstrom, CT (2011). Multilevel compression of random walks on networks reveals hierarchical organization in large integrated systems. PloS one, 6(4):e18209. doi: 10.1371/journal.pone.0018209. arXiv:1010.0431. Rugh, W (1996). Linear system theory. Prentice Hall, Upper Saddle River. ISBN 9780134412054. Russett, B, Oneal, JR and Davis, DR (2003). The Third Leg of the Kantian Tripod for Peace: International Organizations and Militarized Disputes, 1950–85. International Organization, 52(03):441–467. doi: 10.1162/002081898550626. Russett, BM, Oneal, JR and Cox, M (2000). Clash of Civilizations, or Realism and Liberalism Deja Vu? Some Evidence. Journal of Peace Research, 37(5):583–608. doi: 10.1177/0022343300037005003. Schaeffer, SE (2007). Graph clustering. Computer Science Review, 1(1):27–64. doi: 10.1016/j.cosrev.2007.05.001. Sella, G and Hirsh, AE (2005). The application of statistical physics to evolutionary biology. Proceedings of the National Academy of Sciences of the United States of America, 102(27):9541–6. Shi, G, Proutiere, A, Johansson, M, Baras, JS and Johansson, KH (2013). The evolution of beliefs over signed social networks. arXiv:1307.0539. 277

11

BIBLIOGRAPHY

Shwed, U and Bearman, PS (2010). The Temporal Structure of Scientific Consensus Formation. American Sociological Review, 75(6):817–840. doi: 10.1177/0003122410388488. Singer, JD and Small, M (1966). Formal alliances, 1815–1939: A Quantitative Description. Journal of Peace Research, 3(1):1–31. doi: 10.1177/002234336600300101. Small, M and Singer, JD (1969). Formal Alliances, 1816-1965: an Extension of the Basic Data. Journal of Peace Research, 6(3):257–282. doi: 10.1177/002234336900600305. Sommerfeld, RD, Krambeck, HJ and Milinski, M (2008). Multiple gossip statements and their effect on reputation and trustworthiness. Proceedings. Biological sciences / The Royal Society, 275(1650):2529–36. doi: 10.1098/rspb.2008.0762. Sommerfeld, RD, Krambeck, HJ, Semmann, D and Milinski, M (2007). Gossip as an alternative for direct observation in games of indirect reciprocity. Proceedings of the National Academy of Sciences of the United States of America, 104(44):17435–40. doi: 10.1073/pnas.0704598104. Still, G (2001). How to split the eigenvalues of a one-parameter family of matrices. Optimization, 49(4):387–403. doi: 10.1080/02331930108844539. Stouffer, DB and Bascompte, J (2011). Compartmentalization increases food-web persistence. Proceedings of the National Academy of Sciences of the United States of America, 108(9):3648–52. doi: 10.1073/pnas.1014353108. Szell, M, Lambiotte, R and Thurner, S (2010). Multirelational organization of large-scale social networks in an online world. Proceedings of the National Academy of Sciences of the United States of America, 107(31):13636–41. doi: 10.1073/pnas.1004008107. arXiv:1003.5137. Theodoridis, S and Koutroumbas, K (2006). Pattern Recognition. Academic Press. ISBN 9780080513614. Tibély, G and Kertész, J (2008). On the equivalence of the label propagation method of community detection and a Potts model approach. Physica A: Statistical Mechanics and its Applications, 387(19-20):4982–4984. doi: 10.1016/j.physa.2008.04.024. 278

BIBLIOGRAPHY

Traag, VA, Browet, A, Calabrese, F and Morlot, F (2011). Social Event Detection in Massive Mobile Phone Data Using Probabilistic Location Inference. In Proceedings IEEE SocialCom’2011, pages 625–628. IEEE. doi: 10.1109/PASSAT/SocialCom.2011.133. Traag, VA and Bruggeman, J (2009). Community detection in networks with positive and negative links. Physical Review E, 80(3):036115. doi: 10.1103/PhysRevE.80.036115. arXiv:0811.2329. Traag, VA, Krings, G and Van Dooren, P (2013). Significant scales in community structure. submitted. arXiv:1306.3398. Traag, VA, Nesterov, Y and Van Dooren, P (2010). Exponential Ranking: taking into account negative links. LNCS, 6430:192–202. doi: 10.1007/978-3-642-16567-2. Traag, VA, Van Dooren, P and De Leenheer, P (2013). Dynamical models explaining social balance and evolution of cooperation. PLoS ONE, 8(4):e60063. doi: 10.1371/journal.pone.0060063. arXiv:1207.6588. Traag, VA, Van Dooren, P and Nesterov, Y (2011a). Indirect reciprocity through gossiping can lead to cooperative clusters. In IEEE Symposium on Artificial Life 2011, pages 154–161. IEEE. doi: 10.1109/ALIFE.2011.5954642. Traag, VA, Van Dooren, P and Nesterov, Y (2011b). Narrow scope for resolution-limit-free community detection. Physical Review E, 84(1):016114. doi: 10.1103/PhysRevE.84.016114. arXiv:1104.3083. Traulsen, A, Claussen, J and Hauert, C (2005). Coevolutionary Dynamics: From Finite to Infinite Populations. Physical Review Letters, 95(23):238701. doi: 10.1103/PhysRevLett.95.238701. Traulsen, A, Nowak, M and Pacheco, J (2006). Stochastic dynamics of invasion and fixation. Physical Review E, 74(1):011909. doi: 10.1103/PhysRevE.74.011909. Traulsen, A, Shoresh, N and Nowak, MA (2008). Analytical results for individual and group selection of any intensity. Bulletin of mathematical biology, 70(5):1410–24. doi: 10.1007/s11538-008-9305-6. Uitermark, J (2012). Dynamics of Power in Dutch Integration Politics: From Accommodation to Confrontation. University of Amsterdam Press, Amsterdam. ISBN 9789089644060. 279

11

BIBLIOGRAPHY

Von Neumann, J and Morgenstern, O (2007). Theory of Games and Economic Behavior. Princeton University Press. ISBN 0691130612. Ward, MD and Gleditsch, KS (1998). Democratizing for Peace. The American Political Science Review, 92(1):51. doi: 10.2307/2585928. Wasserman, S and Faust, K (1994). Social Network Analysis. Cambridge University Press, Cambridge, UK. Watts, DJ (2002). A simple model of global cascades on random networks. Management, 99(9). Wert, SR and Salovey, P (2004). A social comparison account of gossip. Review of General Psychology, 8(2):122–137. doi: 10.1037/10892680.8.2.122. White, HD (2004). Citation Analysis and Discourse Analysis Revisited. Applied Linguistics, 25(1):89–116. doi: 10.1093/applin/25.1.89. Wilson, DS (1975). A theory of group selection. Proceedings of the National Academy of Sciences, 72(1):143–146. doi: 10.1073/pnas.72.1.143. Xu, R and Wunsch, D (2008). 9780470382783.

Clustering.

Wiley, New Jersey.

ISBN

Yen, L, Fouss, F, Decaestecker, C, Francq, P and Saerens, M (2009). Graph nodes clustering with the sigmoid commute-time kernel: A comparative study. Data & Knowledge Engineering, 68(3):338–361. doi: 10.1016/j.datak.2008.10.006. Zaslavsky, T (1982). Signed graphs. Discrete Applied Mathematics, 4(1):47– 74. doi: 10.1016/0166-218X(82)90033-6. Zhang, Y, Friend, A, Traud, AL, Porter, MA, Fowler, JH et al. (2008). Community structure in Congressional cosponsorship networks. Physica A: Statistical Mechanics and its Applications, 387(7):1705–1712. doi: 10.1016/j.physa.2007.11.004.

280

Nomenclature

community sets (p. 23)

C ∆H

difference between two partitions (p. 41)

∆H(σi = c 7→ d)

move node (p. 41)

∆H({c, d} 7→ c0 )

merge communities (p. 42)

∆H(c0 7→ {c, d})

split communities (p. 42)

δ

H(σ ) H LP

Kronecker delta (p. 24),

Dirac delta (p. 218) canonical model (p. 24) LP model (p. 30)

HAFG

AFG model (p. 28)

HCPM

CPM model (p. 30)

HRB

RB model (p. 25)

HRN

RN model (p. 29)

h·i µ NMI( X, Y ) σ VI( X, Y )

average (p. 26) mixing parameter (p. 50) normalized mutual information (p. 53) membership vector (p. 22) variation of information (p. 53)

A

adjacency matrix (p. 22)

B

modularity matrix (p. 47)

11

Nomenclature

E E±

edges (p. 22) positive/negative edges (p. 155)

F

faction (p. 156)

f s (~n)

fitness (p. 205)

G G± H (X) H ( X, Y ) H (X | Y) I ( x) I ( X, Y )

graph (p. 22) positive/negative graph (p. 116) entropy (p. 35) joint entropy (p. 35) conditional entropy (p. 35) information (p. 35) mutual information (p. 53)

In

identity matrix (p. 29)

ki

degree (p. 27)

S

community matrix (p. 47)

V

nodes (p. 22)

282

Index

H ( X ), 35 H ( X | Y ), 35 I ( X, Y ), 53 I ( x), 35 In , 29 ∆H, 41 ∆H(σi = c 7→ d), 41 ∆H({c, d} 7→ c0 ), 42 ∆H(c0 7→ {c, d}), 42 H(σ ), 24 HAFG , 28 HCPM , 30 HRB , 25 HRN , 29 H LP , 30 NMI( X, Y ), 53 VI( X, Y ), 53 δ, 24, 218 h·i, 26 µ, 50

Chebyshev’s inequality, 100 chord, 160 chromatic number, 165 clique, 61, 165 code, 36 cognitive dissonance, 154 community graph, 46 community matrix, 47 community sets, 23 conditional entropy, 35 configuration model, 27 connected components, 164 Constrained Triad Dynamics, 171 CPM model, 30 dangling node, 247 degree, 27 degree distribution, 27 delta Dirac, 218 Kronecker, 24 diagonalizable, 175 direct reciprocity, 222 discrete choice, 249 dyad, 128

AFG model, 28 AllC, 220 AllD, 220, 223 Banach fixed point, 255 benefit-cost ratio, 223 binary entropy, 105 binomial distribution, 170 bipartite, 165 Boltzmann distribution, 42, 239, 250

eigenvalue, 29 decomposition, 48 eigenvector, 29 entropy, 35 Erdös-Renyí graph, 26, 99 283

11

INDEX

ESS, 203 evolutionary advantage, 209 expected payoff, 203, 223 faction, 156 fitness, 205 fixation probability, 208 Fokker-Planck, 217 graph, 22 homophily, 115 indirect reciprocity, 226 induced subgraph, 99 information, 35 intensity of selection, 206 isomorphic, 89 Jacobian, 254 Jordan block, 179 form, 179 Kullback-Leibler divergence, 105 Laplacian, 39 layers, 121 leading eight, 236 link probability, 25 Local Triad Dynamics, 168 Louvain method, 45 LP model, 30 Markov’s inequality, 100 matrix adjacency, 22 identity, 29 modularity, 47 normal, 186 orthogonal, 48, 175 284

positive definite, 192 skew-symmetric, 175, 190 stability, 33 Toeplitz, 179 maxflow, 130 membership vector, 22 merge communities, 42 mixing parameter, 50 Moran Process, 205 move node, 41 mutual information, 53 Nash equilibrium, 203 neutral selection, 209 node size, 47 norm Frobenius, 174 mixed matrix, 254 normal matrix, 175 normalized mutual information, 53 PageRank, 246 pairwise comparison, 206 prisoner’s dilemma, 219 random walk, 32, 246 RB model, 25 replicator equation, 215 reproduction probability, 205 reputation dynamics, 228 resolution limit, 61 Riccati, 176, 187, 191 risk dominant, 209 RN model, 29 scale invariant, 83 sign of cycle, 159 sign of path, 159 signed graph, 155 Simulated Annealing, 41

INDEX

social balance, 115, 156 spectral bisectioning, 48 split communities, 42 Stirling’s formula, 104 strategy, 203 strength, 118 symbol, 36 symmetric, 47 Taylor series, 210 TFT, see tit-for-tat tit-for-tat, 222–225 trace, 33 transpose, 47 tree, 68 triad, 156 unit simplex, 254 unitarily invariant, 174 variation of information, 53 weak social balance, 163 Win-Stay-Loose-Shift, 225 Wright-Fisher, 207 WSLS, see Win-Stay-Loose-Shift zap factor, 247

285

11

INDEX

286

Suggest Documents